Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Bui Nhui

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2666

Why NAT (Network Address Translation) is used?

Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b 3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical 8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask 8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64 8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless

8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two 8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r. answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process. answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this?

answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem? answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data. answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides? answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer . answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080

8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol 8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal? answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true? answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch? answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks

8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer? answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain 8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation 8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl

ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers? answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN? answer: a. The source device encapsulates data in a frame with the MAC addre ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______ answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI? answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps 8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm

8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer? answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets? answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename 6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting? answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame

before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 5.9.ARP stands for __________ Answer: A. Address Resolution Protocol 5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte

14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization 17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record. alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address? Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress?

Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi

ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP

RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star 5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o

f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security 11. Which topology requires a multipoint connection? answer (d): Bus 12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added 20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer? Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport

28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero 31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________. Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A.

Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise 49. A sine wave is ________. Answer: d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise 55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line

63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude? Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI 73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal

81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation. Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude 84. Which of the following is most affected by noise? Answer: d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases 89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area.

Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than

115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM 119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM 120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications. Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial 125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light 129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables

133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than 136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index 140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical 143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar

151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch? Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps

168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______. Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end 175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6 182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL

185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data 187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder 195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro

cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded 205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error? Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are 210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state.

Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation

249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______. Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1

272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP 278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer. Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame. Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One

297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC) 299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID. Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical 311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing. Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit.

Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station . Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the 332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium 336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b) 340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product?

Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length. Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches. Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine 366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of

376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above 386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______.

Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c) 403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP

423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? Answer: c. n 1 425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing 427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g

roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB 451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______. Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited 461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket

473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port 486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______. Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out

of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP 503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat

ed with Integrated Services. Answer: c. Scalability 506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper 507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate. 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above 511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio 513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error. Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services

of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time. Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open 522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent 523. The server program is _______ because it is always available, waiting for a client request. Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open 527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time. Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect

ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program 535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er. Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain 544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given

547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain to resolve its IP address? Answer: b. kenz.acct.sony.jp 551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true. 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once 555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding

561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type 562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG 563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type 565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email. Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above 568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above

575. A request message always contains _______. Answer: d. A request line and a header 576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number 577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. Answer: a. PUT 579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents 581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP 583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response 587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter

590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? Answer: c. Static 592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head 593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute 595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above 597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE

603. Which category of HTML tags allows the listing of documents? Answer: c. List 604. A program can use _______ to write a CGI program. Answer: d. Any of the above 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static 606. The server receives input from a browser through _______. Answer: b. A form 607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML 609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression

618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______. Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file. Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive 628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers

631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode 632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only 633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm 634. Before a message is encrypted, it is called _______. Answer: d. Plaintext 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher 637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key 639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above 642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext

645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509 647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS 655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce

658. A _______ certifies the binding between a public key and its owner. Answer: c. CA 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH 668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the

TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______. Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer level. Answer: c. IPSec 673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy. Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid 681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate

3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits 5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses. Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets 10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded? Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol? Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop?

Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above. 11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol. Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP? Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______. Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited 3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der? Answer: C) Length of header 9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea

12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application program. Answer: C) Socket 15 INCORRECT The _______ field is used to order packets of a message. Answer: A) Sequence number 16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? Answer: D. EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper

6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25 Answer: C. Centronics-50 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Answer: C. Repeater 9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment 10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations?

Answer: C.

Coax

17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer: A. Print server 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. Answer: B. RG-58 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus 7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes.

11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP 12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Answer: D. Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? Answer: B. NAS devices are less expensive. 16. used on Answer: 17. Answer: An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500

18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Answer: B. NIC In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols

A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to:

Answer:

*A.

Assign IP addresses to clients automatically

Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas

sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash 14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention? answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS 17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server 19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM? answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash 26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use? answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP

What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet. Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address. If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time. What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)?

answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination? answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs? answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers? answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP?

answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1 answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router

Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error? answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0 Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing? answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table? answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards?

answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM. Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries? answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay. When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20 Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires? answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth

How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing? answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2 Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran

slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree 003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors 004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field. answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size 009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1 016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP

020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec 021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process 022. Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control 023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet. answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network

that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____ answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8 Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011

The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______. answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium The information to be communicated in a data communications system is the ______ . answer: Message Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol

answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented _____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP Thick Ethernet can be extended to _____ meters per segment answer: 500 _____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____ answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next

TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___ _ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____ _ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called .. answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise ______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1

In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12

Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data?

Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others.

Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46

What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol?

Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer

Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79

This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90

which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il?

Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds

Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port=

Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134

delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet .

Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. protocol for communication over point .

Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 . meters per segment.

Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the handshaking. . . .

. Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189

___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically?

Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite

d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3

1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol

Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called?

Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class

19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field

15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack?

Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP?

Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them

4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent

. Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection?

Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network?

Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____

Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field

What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number

______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive

/has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts

What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen

t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l

ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network?

Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them

The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State

Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive

What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D

has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64

NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network?

Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are:

Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout

Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000

______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce

answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that

1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN

Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23

What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34

Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA

Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network

Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport).

Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical

Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection

Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100

Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110

CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP

Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full.

Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 .

is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 .

High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157

protocol for communication over point

control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 meters per segment.

If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168

A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender handshaking. . . .

Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server

Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized.

Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5%

21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network

7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP

2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. Answer: 2. Answer: 3. Answer: 4.

What is the data unit used in TCP? Segment What is the service that the UDP protocol provides? Guaranteed delivery What flag is used to close TCP connection? FIN Because the sending and the receiving processes may not write or read da

ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct?

Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair

11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches?

Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct

15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a

nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process

. Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless

addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final

answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers?

Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio

n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network

1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge

stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet

Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream

In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented

The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous

systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit

In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses

Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4

With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28

Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of

Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver

In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t

o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver

.In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD

The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server:

Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport

Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts

What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____

Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive

r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is

Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram

DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission

1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system.

1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route

r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP

Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28

In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39

If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is

Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub.

Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe

s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping?

Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP

Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP)

Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than

the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag

Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric

Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control .

Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. meters per segment. protocol for communication over point .

Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow . .

Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. . .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use

Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours

In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection?

Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___

Answer: 31. ed-pair a. b. c. d. 32. Answer: 33. Answer: 34. nswer. Answer: 35. Answer:

uses buffers ___ specifies a physical star topology featuring a central hub and twist cable as the medium. 10BASE-T 10BASE5 10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a fixed number of blocks In ___ resolution, the resolver expects the server to supply the final a recursive By default, FTP uses which ports? 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol

Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila

r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. Answer: 2. __times Answer: 3. Answer: 4. Answer: ______is used to compress video. JPEG According to the Nyquist theorem, we need to sample an analog signal____ the highest frequency. Two ______is more powerful and complex than______. IMAP4; POP3 What does the URL need to acess a document All are correct

5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state

Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm

on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following? Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation? Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed?

Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion? Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps? Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching? Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets? Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers?

Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity? Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols? Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur? Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers? Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router? Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates? Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded? Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27?

Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list? Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs? Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2? Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address? Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing? Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP

requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates. Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network? Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1 Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer? Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure? Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations

Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following? Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs? Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off? Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols? Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function

All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork? Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru

cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table? Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request? Answer: #Ping Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number Which best describes the function of the Physical Layer? answer: Provides electrical, mechanical, procedural and functional means for act ivating and maintaining links between systems. What best describes the functions of the Application Layer? answer: Defines end-to-end delivery of packets What happens after a collision has occurred on a network after the jam signal is sent? answer: All stations stop sending frames for a randomly selected time period Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? answer: Ethernet switch Why has a layered network model been developed? answer: Accelerates evolution, ensures interoperable technology and facilitates modular engineering. Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? answer: Windowing If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? answer: 14 During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? answer: Acknowledgement and retransmission Which Layer of the OSI model is concerned with the topology of a network? answer: Data Link Which network device provides internetworking and broadcast control? answer: Router Where is the Layer 2 address found on a workstation? answer: On the network interface card What are the most common LAN technologies used in networking today? answer: Ethernet, token ring, FDDI Which of the following is true about a CSMA/CD network? answer: One node's transmission traverses the entire network and is seen and che cked by every node. Which Layer of the OSI model provides data representation and code formatting? answer: Presentation Layer What correctly describes the five conversion steps of data encapsulation? answer: Data-segments-packets-frames-bits Which OSI Layer determines best path selection?

answer: Network Layer Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? answer: There will be no response. Which Layer of the OSI model handles data encryption? answer: Presentation Routers make forwarding decisions based on which kind of address? answer: logical Which Cisco IOS command is used to enter privileged mode? answer: enable What is the default user-mode prompt for a Cisco router? answer: Router> What do WAN Data link protocols describe? answer: How frames are carried between systems What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? answer: It indicates the location of an error in a command string What best describes Frame Relay? answer: Uses high quality digital facilities with no error correction Which layers of the OSI model do WAN standards describe? answer: Physical and data link Which is an example of a data circuit terminating equipment (DCE)? answer: Modem What is the prompt of a Cisco router in the priviledged mode? answer: Router# Which packet-switched service is more efficent than X.25? answer: Frame Relay If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? answer: B. ? What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? answer: The spacebar Which memory component of a router loses its content when the router is turned o ff? answer: RAM What can only be done in privileged mode on Cisco routers? answer: Change the configuration Which character is used to enter the help mode? answer: ? Which protocol does a WAN use to make path determination decisions? answer: IP Which WAN protocol supports point-to-point and multipoint configurations? answer: HDLC Which of the following WAN technologies is a Circuit-Switched Service? answer: Narrowband ISDN Which of the following WAN technologies is a Cell-Switched Service? answer: Asynchronous Transfer Mode Which of the following are stored in NVRAM? answer: Configuration Files What do the WAN Physical Layer standards describe? answer: Interface between DTE and DCE Which keystroke will recall the previous command entry on a Cisco router user in terface? answer: Up arrow Which service does a WAN provide to LANs? answer: Exchange of data packets between routers and the LANs they support In which Layer of the OSI Model do WAN routers operate? answer: Network Layer When working with Cisco IOS, at which level of access are users able to view rou

ter status but are unable to change router configuration? answer: User mode Which Cisco IOS command shows the configuration file stored in NVRAM? answer: show startup-config Which external configuration source is used with a modem? answer: Auxiliary Port The show interface serial Cisco IOS router command can display which one of the following lines of information? answer: Serial1 is up, line protocol is up. Which router component stores configuration files even when power is off? answer: NVRAM What is the router prompt for the interface configuration mode? answer: Router(config-if)# Which protocol is used to show summary configuration information about a directl y connected Cisco router? answer: Cisco Discovery Protocol Which Cisco IOS command is used to show current telnet connections? answer: show sessions What is the correct command to go from the user EXEC mode to the privileged EXEC mode? answer: enable Which Cisco IOS command displays routing table entries? answer: show ip route What is stored in working RAM and is constantly updated when the router is worki ng properly? answer: Routing Table When is the configuration file loaded into RAM? answer: Each time the router is initialized Which command will indicate the status of IP, IPX, and AppleTalk? answer: show protocols What is the first thing the router does when power is turned on? answer: Executes a bootstrap program Which port is used to initially configure a router? answer: Console Which response to the appropriate show command indicates an operational serial l ink? answer: Serial1 is up, line protocol is up Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? answer: RXBOOT How many Telnet sessions can a Cisco router have simultaneously? answer: 5 Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? answer: show startup-config Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which command shows the status of Ethernet, Serial, BRI, and other ports? answer: show interfaces Which router component is responsible for the power-on bootstrap sequence? answer: ROM Which command displays information about the current Cisco IOS software version running on a router? answer: show version In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? answer: Layer 2 Which Cisco IOS command displays the backup configuration file stored in NVRAM? answer: Router# show startup-config While in setup mode on a Cisco router, what is used to display default settings

for configuration purposes? answer: square brackets - example [yes] What is the first global configuration parameter set when using the setup mode? answer: host name of the router What is the function of the erase startup-config command? answer: It deletes the configuration file in NVRAM You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? answer: copy running-config startup-config Which command will save an active configuration? answer: copy running-config startup-config How does the router prompt appear when you are in global configuration mode? answer: Router(config)# Where is the next place a router looks if it cannot find the IOS image in flash? answer: TFTP What is the function of the reload command? answer: It reboots the router Which of the following is the correct order in which a router boots and looks fo r files? answer: 1,5,7,6,2,4,3 When setting passwords for vty 0 4, what are you setting a password for? answer: Telnet sessions What is an important function of the power-up self test (POST)? answer: Executes diagnostics that verify the basic operation of router hardware Which password is encrypted in the configuration file by default? answer: Enable secret Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is an important result of the configuration file loading onto a router? answer: Starts routing processes, supplies addresses for interfaces, and sets up media characteristics Where is the configuration file saved when you complete the setup process? answer: NVRAM Once you have selected an interface to configure, which prompt would be on the s creen? answer: Router(config-if)# You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? answer: banner motd Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C Which command is used to copy a system image to a network server? answer: Router# copy flash tftp Which configuration register mode is used to tell the router to boot answer: 0x---1 Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename Which command can be used to check the amount of system memory available? answer: Router# show flash In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets Which type of addressing scheme is formed by MAC addresses? Answer: @A. flat Which address(es) appear in an IP packet's header? Answer: source and destination addresses Which of the following is a benefit of network segmentation? Answer: reduced congestion

Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer: 205.255.170.205 Which octet(s) are assigned locally in a class B address? Answer: The third and fourth octets are assigned locally What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? Answer: 6 What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? Answer: subnets Which class of network addresses allows the borrowing of 15 bits to create subne ts? Answer: Class A Which part of a network layer address does the router use during path determinat ion? Answer: the network address Which of the following represents the use of binary ones in a subnet mask? Answer: subnet and network bits How large is the network/subnet portion of a Class B license having a subnet mas k of 255.255.240.0? Answer: 20 bits How many bits are in an IP address? Answer: 32 How many total subnets can be created if four bits are borrowed from the host fi eld? Answer: 16 What is specified by the network number in an IP address? Answer: the network to which the host belongs Which of the following assists devices on the same network in determining a pack et's final destination? Answer: host ID Which of the following would be the largest possible number expressed by an 8 bi t binary number? Answer: 11111111 Which of the following best describes the address 139.219.255.255 in an unsubnet ted environment? Answer: Class B broadcast address The IP address for a router interface should be part of what? Answer: the network attached to the interface When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? Answer: IP address of the destination host What is the correct term for when routes are learned automatically? Answer: dynamic routing What do bridges and switches use to make data forwarding decisions? Answer: physical addresses Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer: router Which type of routing protocol is RIP? Answer: distance vector Router ARP tables hold information from which of the following? Answer: all networks connected to them What is the most common protocol used to transfer routing information between ro uters located on the same network? Answer: RIP In a connection-oriented system, what happens before any user data is transferre d? Answer: a connection is established between the sender and receiver

What happens if a data packet reaches a router that is destined for a network wi th which that router is not directly connected? Answer: The router forwards the packet to another router that most likely contai ns information about the destination. Which of the following contains a unique network number that is used in routing? Answer: IP address Which protocol is used to dynamically assign IP addresses? Answer: DHCP Connection-oriented network processes are often referred to as what? Answer: circuit switched Which describes the changes made to a packet's IP destination address, as that p acket is passed from router to router on it's way to the destination host? Answer: The destination IP address never changes. Which protocol can find the MAC address of a computer given its IP address? Answer: ARP Why is a static route the preferred method for reaching stub networks? Answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer: proxy ARP Which is an example of a routed protocol? Answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? Answer: transport What do routers use to exchange routing tables and share route information? Answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? Answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? Answer: IGRP In a connectionless system, which of the following is correct? Answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? Answer: IP What are the two proprietary routing protocols developed by Cisco? Answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? Answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer: the domain The Telnet application works mainly at which layers of the OSI model? Answer: application, presentation, and session Which application layer protocol supports e-mail programs? Answer: POP3 What is the language used to create web pages? Answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? Answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? Answer: IP address Which protocol is designed to download or upload files on the Internet? Answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi

cient resources exist for communication between systems? Answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? Answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? Answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? Answer: DNS E-mail addresses consist of which two parts? Answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? Answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? Answer: hyperlink What is the data-link destination address of a broadcast message? Answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? Answer: All devices look at the request and ONLY host B will reply with the MAC address Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? Answer: Session Which best describes the structure of a MAC address? Answer: 24 bit vendor code plus 24 bit serial number 1. What is the framing method used in PPP? answer: byte stuffing 2. Assumme the RTT 200ms, the transmission time of a Web object 10ms,how long do es it take answer: 410ms 3. FPT uses port 21 for sending answer: Identification and password...data file 4. In the exponential backoff phase of CSMA/CD, after n collisions of a frame, t he adapter then waits K x 512 bit answer: {0,1,2,...,2m-1} where m=min(n,10) 5. In the PPP frame, the........... field defines answer: FCS 6. Main reason of packet loss in the Internet is...... answer: Routers drop packets because their buffers are full 7. The Link State (LS) algorithm results in....... answer: The least cost path fromm one node to all nodes in the network 8. What are the two methods of circuit switching for dividing answer: FDM and TDM 9. In the DNS, the names are defined in .......... structure answer: A tree 10. What is the protocol that network devices answer: DHCP 11. A name server is....... for a host if it always has a DNS record that answer: Authoritative 12. In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link 13. Two-dimensional parity check can......... answer: Detect a single bit error and correct it 14. Which statement is correct about packet switching and circuit switching answer: With the same delay performance, packet-switching allows more number of

users than circuit switching 15. Why CSMA/CD is not used in Wifi? answer: Because of the hiden terminal problem and fading problem 16. When CRC is calculated consider the 4-bit generator G=1001 and suppose that D has the value 111010. answer: 101 17. Those followings answer: TCP congestion control 18. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of Ip addresses that can be assigned to this subnet answer: 129.17.129.96-129.17.129.127 19. Which delay mainly depends on the congestion of the network? answer: congesting delay 20. What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unittime 21. Traceroute command uses answer: ICMP 22. Which one is correct about P2P network? answer: A user computer can be both client and server 23. Generic router architecture includes answer: All of them 24. The core of the internet consist of answer: Routers 25. Very popular browser-based email services such as Hotmail or Yahoo! answer: HTTP 26. There are 4 serial links between the client and the server, with the transmi ssion rates being 1Mbps, 3Mbps, 2 Mbps answer: 0.5 Mbps 27. Which of the following is the Mac protocol answer: CSMA/CD 28. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the first collision of a frame, the adapter then waits.... answer: 512 microseconds 29. IMAP is designed to allow users to manipulate......., so it is more..... tha n POP3 answer: Remote mailboxes...complex 30. CSMA/CA belong.....group, one of three broad classes of MAC protocols answer: Random access 31. What is incorrect about Web cache (proxy server)? answer: Web caches can improve in Internet performance in general 32. The transport layer protocol provides logical communication between....runni ng on different hosts, while the network layer protocol provides logical communi cation between..... answer: Processes...Hosts 33. In TCP congestion control, two important variables the sender has to keep tr ack are answer: Congestion window and socket number 34. In IP fragmentation, a datagram is fragmented into two packets, the the firs t packet has answer: Offset=0 and FragFlag=1 35. rdt3.0 provides reliable data transfer over a ........... answer: Lossy channel with bit errors 36. The time-to-live (TTL) field in the datagram is included to insure that data grams....... answer: Do not circulate forever in the network 37. A datagram is fragmented into three smaller datagrams. Which of the followin g is true? answer: The identification field is the same for all three datagrams 38. Each TCP segment has ......bytes of header overhead where as UDP has.... byt es of overhead.

answer: 20...8 39. In OSI model, as data packet moves from the lower to the upper layer header are .... answer: removed 40. Which one is correct about Denial of Service (DOS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic. 41. Which statement is correct about router? answer: Each interface to have an unique IP address. 42. Which of the following is hybrid of client-server and P2P? answer: Skype 43. Channel partitioning, random access, and taking turns are ..... answer: Mac protocols 44. The broadcast MAC address in Lan is answer: FF-FF-FF-FF-FF-FF 45. The DNS protocol runs over ........... and uses port ................. answer: UDP...53 46. In Congestion avoidance of TCP flow control, if timeout occurs while the cur rent congestion window size is 16, the congestion window will answer: Remain 16 47. What is the total delay for transmission of 1.25 megabytes of images over fi ber optic cable with distance of 3000km with transmission rate of 1 Gbps answer: 20msec 48. Which one is not in UDP segment header? answer: Receiving Window Size 49. The ........... that together implement the DNS distributed database, store .......... for the hostname to IP address mappings. answer: Authoritative servers .....Entries 50. What is Not a function of a router? answer: Working with IP address. 51. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in but before the rest of frame has arrived 52. The purpose of ICMP echo request and ICMP echo relay messages is to...... answer: report errors 53. This job of delivering the data in a .....to the correct.........is called d e-multiplexing answer: tranport-layer segment....application process 54. The combination of an IP address and a port number is called a.... answer: socket 55. Which layer in the Internet that connects directly to wire? answer: Physical 56. ......... is a supplementary protocol that allows non-ASCII data to be sent through email. answer: MIME 57. ......Applications typically uses......... answer: Elastic....DNS 58. In TCP, what can happen if the timeout is smaller than the connection's roun d-trip time? answer: It can result in unnecessary retransmissions 59. Which of the following is the pipelining protocol answer: Selective Repeat 60. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer: 201.14.78.64 Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2

Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b 3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical 8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask 8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64 8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless 8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism

8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two 8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r. answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process. answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem?

answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data. answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides? answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer . answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080 8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol

8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal? answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true? answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch? answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks 8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu

b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer? answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain 8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation 8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers?

answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN? answer: a. The source device encapsulates data in a frame with the MAC addre ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______ answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI? answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps 8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm 8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer?

answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets? answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename 6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting? answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC

Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 5.9.ARP stands for __________ Answer: A. Address Resolution Protocol 5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte 14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827

16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization 17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record. alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address? Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b

ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other

SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is

Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star 5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times.

answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security 11. Which topology requires a multipoint connection? answer (d): Bus 12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added 20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer? Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport 28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals

30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero 31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________. Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than

48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise 49. A sine wave is ________. Answer: d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise 55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line 63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit.

Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude? Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI 73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation.

Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude 84. Which of the following is most affected by noise? Answer: d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases 89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves

100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __.

Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM 119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM 120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications. Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial 125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light 129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables 133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves.

Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than 136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index 140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical 143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a

ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch? Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM

169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______. Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end 175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6 182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL 185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data

187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder 195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors.

Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded 205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error? Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are 210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state.

Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation 249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______.

Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz.

Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP 278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer. Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame. Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC)

299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID. Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical 311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing. Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit. Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above

327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station . Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the 332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium 336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b) 340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length.

Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches. Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine 366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64

378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above 386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______. Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c)

403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP 423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? 1 Answer: c. n

425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing 427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees.

Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB 451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______. Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited 461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket 473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt

es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port 486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______. Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion.

Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP 503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. Answer: c. Scalability

506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper 507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate. 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above 511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio 513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error. Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time.

Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open 522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent 523. The server program is _______ because it is always available, waiting for a client request. Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open 527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time. Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program

535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er. Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain 544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label.

Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain to resolve its IP address? Answer: b. kenz.acct.sony.jp 551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true. 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once 555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding 561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type

562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG 563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type 565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email. Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above 568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above 575. A request message always contains _______. Answer: d. A request line and a header

576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number 577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. Answer: a. PUT 579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents 581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP 583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response 587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET

The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? Answer: c. Static 592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head 593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute 595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above 597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE 603. Which category of HTML tags allows the listing of documents? Answer: c. List

604. A program can use _______ to write a CGI program. Answer: d. Any of the above 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static 606. The server receives input from a browser through _______. Answer: b. A form 607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML 609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression 618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp

619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______. Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file. Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive 628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode

632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only 633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm 634. Before a message is encrypted, it is called _______. Answer: d. Plaintext 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher 637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key 639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above 642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution

646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509 647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS 655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce 658. A _______ certifies the binding between a public key and its owner. Answer: c. CA

659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH 668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______.

Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer level. Answer: c. IPSec 673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy. Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid 681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits

5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses. Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets 10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded? Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol? Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop? Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above.

11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol. Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP? Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______. Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited 3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der? Answer: C) Length of header 9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence 12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea

he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application program. Answer: C) Socket 15 INCORRECT The _______ field is used to order packets of a message. Answer: A) Sequence number 16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? Answer: D. EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25

Answer: C.

Centronics-50

7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Answer: C. Repeater 9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment 10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? Answer: C. Coax 17. Which network component

shares out a printer so that printing services can be prov

ided to the entire network? Answer: A. Print server 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. Answer: B. RG-58 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus 7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP

12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Answer: D. Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? Answer: B. NAS devices are less expensive. 16. used on Answer: 17. Answer: An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500

18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Answer: B. NIC In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server

HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed?

Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash

14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention? answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS 17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server 19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM? answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash 26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use? answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha

t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet. Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address. If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time. What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b

ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination? answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs? answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers? answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP? answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv

ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1 answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error?

answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0 Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing? answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table? answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards? answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence?

answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM. Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries? answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay. When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20 Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires? answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a

ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing? answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2 Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree

003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors 004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field. answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size 009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1 016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP 020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec

021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process 022. Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control 023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet. answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers

Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____ answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8 Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011 The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______.

answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium The information to be communicated in a data communications system is the ______ . answer: Message Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented

_____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP Thick Ethernet can be extended to _____ meters per segment answer: 500 _____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____ answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first

Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___ _ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____ _ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called .. answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise ______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2

The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13

What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous?

Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model.

Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47

What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre

ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when

there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80

Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91

The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2)

Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype

Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity

Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135

throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC .

Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data protocol for communication over point .

that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? . meters per segment.

Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 handshaking. . . .

TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream

of bytes and allows the r

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190

___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit

9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye

r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are

3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical

9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7

1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type

of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b

17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___

_____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for

Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP

7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder

IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network.

One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair

cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers?

Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b

In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency.

Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged

Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater

What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with

distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time

Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP

A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record

Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___

Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport

______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay?

Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____

Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven

In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic

What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136

Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder

________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks?

answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er

ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F

Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection

Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35

The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010

Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers.

Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link.

Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45

Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol

Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record

Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111

which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket

Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay.

Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 .

is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented protocol for communication over point .

Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 . meters per segment.

A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver handshaking. . . .

Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI

Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live

6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes.

Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online

9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing

4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all

ows the Answer: 7. Answer: 8. Answer: 9. Answer: 10. CP. The Answer:

receiving process to obtain data as a_____of bytes. Stream; stream TCP uses______________to check the safe and sound arrival of data. An acknowledgment mechanism TCP is a (n)__________transport protocol. Reliable What is the combination of an IP address and a port number called? A socket The bytes of data being transferred in each connection are numbered by T numbering starts with a Randomly generated number

1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay

ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header

13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110

Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents

16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2)

Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses?

Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____.

12 :

Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is

Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process .

Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to :

Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time

1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136

6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12

.9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed?

Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem?

Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back?

Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63

What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s?

Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers

Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram

Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs

Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63

IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____

Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest

ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server.

Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address

Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media?

Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num

ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link

A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance

Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP

_____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne

ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc.

1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates.

answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6

What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers

Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers

Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40

A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server:

Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN.

Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73

When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically?

Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail

Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key?

Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116

TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21

Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium

Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de . .

Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? meters per segment. protocol for communication over point

Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram . . .

Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called

Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC

Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing

13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5

c. d. 32. Answer: 33. Answer: 34. nswer. Answer: 35. Answer:

10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a fixed number of blocks In ___ resolution, the resolver expects the server to supply the final a recursive By default, FTP uses which ports? 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC

Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask

14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static

7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented

17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer.

13

Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask

What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following? Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation? Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed? Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for

a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion? Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps? Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching? Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets? Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers? Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity?

Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols? Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur? Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers? Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router? Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates? Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded? Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27? Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any

Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list? Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs? Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2? Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address? Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing? Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates.

Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network? Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1 Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer? Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure? Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following?

Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs? Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off? Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols? Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch

At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork? Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table?

Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request? Answer: #Ping Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number Which best describes the function of the Physical Layer? answer: Provides electrical, mechanical, procedural and functional means for act ivating and maintaining links between systems. What best describes the functions of the Application Layer? answer: Defines end-to-end delivery of packets What happens after a collision has occurred on a network after the jam signal is sent? answer: All stations stop sending frames for a randomly selected time period Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? answer: Ethernet switch Why has a layered network model been developed? answer: Accelerates evolution, ensures interoperable technology and facilitates modular engineering. Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? answer: Windowing If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? answer: 14 During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? answer: Acknowledgement and retransmission Which Layer of the OSI model is concerned with the topology of a network? answer: Data Link Which network device provides internetworking and broadcast control? answer: Router Where is the Layer 2 address found on a workstation? answer: On the network interface card What are the most common LAN technologies used in networking today? answer: Ethernet, token ring, FDDI Which of the following is true about a CSMA/CD network? answer: One node's transmission traverses the entire network and is seen and che cked by every node. Which Layer of the OSI model provides data representation and code formatting? answer: Presentation Layer What correctly describes the five conversion steps of data encapsulation? answer: Data-segments-packets-frames-bits Which OSI Layer determines best path selection? answer: Network Layer Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? answer: There will be no response. Which Layer of the OSI model handles data encryption?

answer: Presentation Routers make forwarding decisions based on which kind of address? answer: logical Which Cisco IOS command is used to enter privileged mode? answer: enable What is the default user-mode prompt for a Cisco router? answer: Router> What do WAN Data link protocols describe? answer: How frames are carried between systems What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? answer: It indicates the location of an error in a command string What best describes Frame Relay? answer: Uses high quality digital facilities with no error correction Which layers of the OSI model do WAN standards describe? answer: Physical and data link Which is an example of a data circuit terminating equipment (DCE)? answer: Modem What is the prompt of a Cisco router in the priviledged mode? answer: Router# Which packet-switched service is more efficent than X.25? answer: Frame Relay If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? answer: B. ? What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? answer: The spacebar Which memory component of a router loses its content when the router is turned o ff? answer: RAM What can only be done in privileged mode on Cisco routers? answer: Change the configuration Which character is used to enter the help mode? answer: ? Which protocol does a WAN use to make path determination decisions? answer: IP Which WAN protocol supports point-to-point and multipoint configurations? answer: HDLC Which of the following WAN technologies is a Circuit-Switched Service? answer: Narrowband ISDN Which of the following WAN technologies is a Cell-Switched Service? answer: Asynchronous Transfer Mode Which of the following are stored in NVRAM? answer: Configuration Files What do the WAN Physical Layer standards describe? answer: Interface between DTE and DCE Which keystroke will recall the previous command entry on a Cisco router user in terface? answer: Up arrow Which service does a WAN provide to LANs? answer: Exchange of data packets between routers and the LANs they support In which Layer of the OSI Model do WAN routers operate? answer: Network Layer When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? answer: User mode Which Cisco IOS command shows the configuration file stored in NVRAM? answer: show startup-config Which external configuration source is used with a modem?

answer: Auxiliary Port The show interface serial Cisco IOS router command can display which one of the following lines of information? answer: Serial1 is up, line protocol is up. Which router component stores configuration files even when power is off? answer: NVRAM What is the router prompt for the interface configuration mode? answer: Router(config-if)# Which protocol is used to show summary configuration information about a directl y connected Cisco router? answer: Cisco Discovery Protocol Which Cisco IOS command is used to show current telnet connections? answer: show sessions What is the correct command to go from the user EXEC mode to the privileged EXEC mode? answer: enable Which Cisco IOS command displays routing table entries? answer: show ip route What is stored in working RAM and is constantly updated when the router is worki ng properly? answer: Routing Table When is the configuration file loaded into RAM? answer: Each time the router is initialized Which command will indicate the status of IP, IPX, and AppleTalk? answer: show protocols What is the first thing the router does when power is turned on? answer: Executes a bootstrap program Which port is used to initially configure a router? answer: Console Which response to the appropriate show command indicates an operational serial l ink? answer: Serial1 is up, line protocol is up Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? answer: RXBOOT How many Telnet sessions can a Cisco router have simultaneously? answer: 5 Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? answer: show startup-config Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which command shows the status of Ethernet, Serial, BRI, and other ports? answer: show interfaces Which router component is responsible for the power-on bootstrap sequence? answer: ROM Which command displays information about the current Cisco IOS software version running on a router? answer: show version In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? answer: Layer 2 Which Cisco IOS command displays the backup configuration file stored in NVRAM? answer: Router# show startup-config While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? answer: square brackets - example [yes] What is the first global configuration parameter set when using the setup mode? answer: host name of the router What is the function of the erase startup-config command?

answer: It deletes the configuration file in NVRAM You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? answer: copy running-config startup-config Which command will save an active configuration? answer: copy running-config startup-config How does the router prompt appear when you are in global configuration mode? answer: Router(config)# Where is the next place a router looks if it cannot find the IOS image in flash? answer: TFTP What is the function of the reload command? answer: It reboots the router Which of the following is the correct order in which a router boots and looks fo r files? answer: 1,5,7,6,2,4,3 When setting passwords for vty 0 4, what are you setting a password for? answer: Telnet sessions What is an important function of the power-up self test (POST)? answer: Executes diagnostics that verify the basic operation of router hardware Which password is encrypted in the configuration file by default? answer: Enable secret Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is an important result of the configuration file loading onto a router? answer: Starts routing processes, supplies addresses for interfaces, and sets up media characteristics Where is the configuration file saved when you complete the setup process? answer: NVRAM Once you have selected an interface to configure, which prompt would be on the s creen? answer: Router(config-if)# You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? answer: banner motd Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C Which command is used to copy a system image to a network server? answer: Router# copy flash tftp Which configuration register mode is used to tell the router to boot answer: 0x---1 Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename Which command can be used to check the amount of system memory available? answer: Router# show flash In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets Which type of addressing scheme is formed by MAC addresses? Answer: @A. flat Which address(es) appear in an IP packet's header? Answer: source and destination addresses Which of the following is a benefit of network segmentation? Answer: reduced congestion Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer: 205.255.170.205 Which octet(s) are assigned locally in a class B address? Answer: The third and fourth octets are assigned locally

What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? Answer: 6 What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? Answer: subnets Which class of network addresses allows the borrowing of 15 bits to create subne ts? Answer: Class A Which part of a network layer address does the router use during path determinat ion? Answer: the network address Which of the following represents the use of binary ones in a subnet mask? Answer: subnet and network bits How large is the network/subnet portion of a Class B license having a subnet mas k of 255.255.240.0? Answer: 20 bits How many bits are in an IP address? Answer: 32 How many total subnets can be created if four bits are borrowed from the host fi eld? Answer: 16 What is specified by the network number in an IP address? Answer: the network to which the host belongs Which of the following assists devices on the same network in determining a pack et's final destination? Answer: host ID Which of the following would be the largest possible number expressed by an 8 bi t binary number? Answer: 11111111 Which of the following best describes the address 139.219.255.255 in an unsubnet ted environment? Answer: Class B broadcast address The IP address for a router interface should be part of what? Answer: the network attached to the interface When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? Answer: IP address of the destination host What is the correct term for when routes are learned automatically? Answer: dynamic routing What do bridges and switches use to make data forwarding decisions? Answer: physical addresses Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer: router Which type of routing protocol is RIP? Answer: distance vector Router ARP tables hold information from which of the following? Answer: all networks connected to them What is the most common protocol used to transfer routing information between ro uters located on the same network? Answer: RIP In a connection-oriented system, what happens before any user data is transferre d? Answer: a connection is established between the sender and receiver What happens if a data packet reaches a router that is destined for a network wi th which that router is not directly connected? Answer: The router forwards the packet to another router that most likely contai ns information about the destination. Which of the following contains a unique network number that is used in routing?

Answer: IP address Which protocol is used to dynamically assign IP addresses? Answer: DHCP Connection-oriented network processes are often referred to as what? Answer: circuit switched Which describes the changes made to a packet's IP destination address, as that p acket is passed from router to router on it's way to the destination host? Answer: The destination IP address never changes. Which protocol can find the MAC address of a computer given its IP address? Answer: ARP Why is a static route the preferred method for reaching stub networks? Answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer: proxy ARP Which is an example of a routed protocol? Answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? Answer: transport What do routers use to exchange routing tables and share route information? Answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? Answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? Answer: IGRP In a connectionless system, which of the following is correct? Answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? Answer: IP What are the two proprietary routing protocols developed by Cisco? Answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? Answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer: the domain The Telnet application works mainly at which layers of the OSI model? Answer: application, presentation, and session Which application layer protocol supports e-mail programs? Answer: POP3 What is the language used to create web pages? Answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? Answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? Answer: IP address Which protocol is designed to download or upload files on the Internet? Answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? Answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? Answer: redirector

Which connection is made to a server and maintained until the user terminates th e connection? Answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? Answer: DNS E-mail addresses consist of which two parts? Answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? Answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? Answer: hyperlink What is the data-link destination address of a broadcast message? Answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? Answer: All devices look at the request and ONLY host B will reply with the MAC address Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? Answer: Session Which best describes the structure of a MAC address? Answer: 24 bit vendor code plus 24 bit serial number 1. What is the framing method used in PPP? answer: byte stuffing 2. Assumme the RTT 200ms, the transmission time of a Web object 10ms,how long do es it take answer: 410ms 3. FPT uses port 21 for sending answer: Identification and password...data file 4. In the exponential backoff phase of CSMA/CD, after n collisions of a frame, t he adapter then waits K x 512 bit answer: {0,1,2,...,2m-1} where m=min(n,10) 5. In the PPP frame, the........... field defines answer: FCS 6. Main reason of packet loss in the Internet is...... answer: Routers drop packets because their buffers are full 7. The Link State (LS) algorithm results in....... answer: The least cost path fromm one node to all nodes in the network 8. What are the two methods of circuit switching for dividing answer: FDM and TDM 9. In the DNS, the names are defined in .......... structure answer: A tree 10. What is the protocol that network devices answer: DHCP 11. A name server is....... for a host if it always has a DNS record that answer: Authoritative 12. In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link 13. Two-dimensional parity check can......... answer: Detect a single bit error and correct it 14. Which statement is correct about packet switching and circuit switching answer: With the same delay performance, packet-switching allows more number of users than circuit switching 15. Why CSMA/CD is not used in Wifi? answer: Because of the hiden terminal problem and fading problem 16. When CRC is calculated consider the 4-bit generator G=1001 and suppose that D has the value 111010.

answer: 101 17. Those followings answer: TCP congestion control 18. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of Ip addresses that can be assigned to this subnet answer: 129.17.129.96-129.17.129.127 19. Which delay mainly depends on the congestion of the network? answer: congesting delay 20. What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unittime 21. Traceroute command uses answer: ICMP 22. Which one is correct about P2P network? answer: A user computer can be both client and server 23. Generic router architecture includes answer: All of them 24. The core of the internet consist of answer: Routers 25. Very popular browser-based email services such as Hotmail or Yahoo! answer: HTTP 26. There are 4 serial links between the client and the server, with the transmi ssion rates being 1Mbps, 3Mbps, 2 Mbps answer: 0.5 Mbps 27. Which of the following is the Mac protocol answer: CSMA/CD 28. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the first collision of a frame, the adapter then waits.... answer: 512 microseconds 29. IMAP is designed to allow users to manipulate......., so it is more..... tha n POP3 answer: Remote mailboxes...complex 30. CSMA/CA belong.....group, one of three broad classes of MAC protocols answer: Random access 31. What is incorrect about Web cache (proxy server)? answer: Web caches can improve in Internet performance in general 32. The transport layer protocol provides logical communication between....runni ng on different hosts, while the network layer protocol provides logical communi cation between..... answer: Processes...Hosts 33. In TCP congestion control, two important variables the sender has to keep tr ack are answer: Congestion window and socket number 34. In IP fragmentation, a datagram is fragmented into two packets, the the firs t packet has answer: Offset=0 and FragFlag=1 35. rdt3.0 provides reliable data transfer over a ........... answer: Lossy channel with bit errors 36. The time-to-live (TTL) field in the datagram is included to insure that data grams....... answer: Do not circulate forever in the network 37. A datagram is fragmented into three smaller datagrams. Which of the followin g is true? answer: The identification field is the same for all three datagrams 38. Each TCP segment has ......bytes of header overhead where as UDP has.... byt es of overhead. answer: 20...8 39. In OSI model, as data packet moves from the lower to the upper layer header are .... answer: removed 40. Which one is correct about Denial of Service (DOS) attack?

answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic. 41. Which statement is correct about router? answer: Each interface to have an unique IP address. 42. Which of the following is hybrid of client-server and P2P? answer: Skype 43. Channel partitioning, random access, and taking turns are ..... answer: Mac protocols 44. The broadcast MAC address in Lan is answer: FF-FF-FF-FF-FF-FF 45. The DNS protocol runs over ........... and uses port ................. answer: UDP...53 46. In Congestion avoidance of TCP flow control, if timeout occurs while the cur rent congestion window size is 16, the congestion window will answer: Remain 16 47. What is the total delay for transmission of 1.25 megabytes of images over fi ber optic cable with distance of 3000km with transmission rate of 1 Gbps answer: 20msec 48. Which one is not in UDP segment header? answer: Receiving Window Size 49. The ........... that together implement the DNS distributed database, store .......... for the hostname to IP address mappings. answer: Authoritative servers .....Entries 50. What is Not a function of a router? answer: Working with IP address. 51. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in but before the rest of frame has arrived 52. The purpose of ICMP echo request and ICMP echo relay messages is to...... answer: report errors 53. This job of delivering the data in a .....to the correct.........is called d e-multiplexing answer: tranport-layer segment....application process 54. The combination of an IP address and a port number is called a.... answer: socket 55. Which layer in the Internet that connects directly to wire? answer: Physical 56. ......... is a supplementary protocol that allows non-ASCII data to be sent through email. answer: MIME 57. ......Applications typically uses......... answer: Elastic....DNS 58. In TCP, what can happen if the timeout is smaller than the connection's roun d-trip time? answer: It can result in unnecessary retransmissions 59. Which of the following is the pipelining protocol answer: Selective Repeat 60. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer: 201.14.78.64 Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n

etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number Which best describes the function of the Physical Layer? answer: Provides electrical, mechanical, procedural and functional means for act ivating and maintaining links between systems. What best describes the functions of the Application Layer? answer: Defines end-to-end delivery of packets What happens after a collision has occurred on a network after the jam signal is sent? answer: All stations stop sending frames for a randomly selected time period Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? answer: Ethernet switch Why has a layered network model been developed? answer: Accelerates evolution, ensures interoperable technology and facilitates modular engineering. Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? answer: Windowing If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? answer: 14 During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? answer: Acknowledgement and retransmission Which Layer of the OSI model is concerned with the topology of a network? answer: Data Link Which network device provides internetworking and broadcast control? answer: Router Where is the Layer 2 address found on a workstation? answer: On the network interface card What are the most common LAN technologies used in networking today? answer: Ethernet, token ring, FDDI Which of the following is true about a CSMA/CD network? answer: One node's transmission traverses the entire network and is seen and che cked by every node. Which Layer of the OSI model provides data representation and code formatting? answer: Presentation Layer What correctly describes the five conversion steps of data encapsulation? answer: Data-segments-packets-frames-bits Which OSI Layer determines best path selection? answer: Network Layer Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? answer: There will be no response. Which Layer of the OSI model handles data encryption? answer: Presentation Routers make forwarding decisions based on which kind of address? answer: logical Which Cisco IOS command is used to enter privileged mode? answer: enable What is the default user-mode prompt for a Cisco router?

answer: Router> What do WAN Data link protocols describe? answer: How frames are carried between systems What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? answer: It indicates the location of an error in a command string What best describes Frame Relay? answer: Uses high quality digital facilities with no error correction Which layers of the OSI model do WAN standards describe? answer: Physical and data link Which is an example of a data circuit terminating equipment (DCE)? answer: Modem What is the prompt of a Cisco router in the priviledged mode? answer: Router# Which packet-switched service is more efficent than X.25? answer: Frame Relay If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? answer: B. ? What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? answer: The spacebar Which memory component of a router loses its content when the router is turned o ff? answer: RAM What can only be done in privileged mode on Cisco routers? answer: Change the configuration Which character is used to enter the help mode? answer: ? Which protocol does a WAN use to make path determination decisions? answer: IP Which WAN protocol supports point-to-point and multipoint configurations? answer: HDLC Which of the following WAN technologies is a Circuit-Switched Service? answer: Narrowband ISDN Which of the following WAN technologies is a Cell-Switched Service? answer: Asynchronous Transfer Mode Which of the following are stored in NVRAM? answer: Configuration Files What do the WAN Physical Layer standards describe? answer: Interface between DTE and DCE Which keystroke will recall the previous command entry on a Cisco router user in terface? answer: Up arrow Which service does a WAN provide to LANs? answer: Exchange of data packets between routers and the LANs they support In which Layer of the OSI Model do WAN routers operate? answer: Network Layer When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? answer: User mode Which Cisco IOS command shows the configuration file stored in NVRAM? answer: show startup-config Which external configuration source is used with a modem? answer: Auxiliary Port The show interface serial Cisco IOS router command can display which one of the following lines of information? answer: Serial1 is up, line protocol is up. Which router component stores configuration files even when power is off? answer: NVRAM

What is the router prompt for the interface configuration mode? answer: Router(config-if)# Which protocol is used to show summary configuration information about a directl y connected Cisco router? answer: Cisco Discovery Protocol Which Cisco IOS command is used to show current telnet connections? answer: show sessions What is the correct command to go from the user EXEC mode to the privileged EXEC mode? answer: enable Which Cisco IOS command displays routing table entries? answer: show ip route What is stored in working RAM and is constantly updated when the router is worki ng properly? answer: Routing Table When is the configuration file loaded into RAM? answer: Each time the router is initialized Which command will indicate the status of IP, IPX, and AppleTalk? answer: show protocols What is the first thing the router does when power is turned on? answer: Executes a bootstrap program Which port is used to initially configure a router? answer: Console Which response to the appropriate show command indicates an operational serial l ink? answer: Serial1 is up, line protocol is up Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? answer: RXBOOT How many Telnet sessions can a Cisco router have simultaneously? answer: 5 Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? answer: show startup-config Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which command shows the status of Ethernet, Serial, BRI, and other ports? answer: show interfaces Which router component is responsible for the power-on bootstrap sequence? answer: ROM Which command displays information about the current Cisco IOS software version running on a router? answer: show version In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? answer: Layer 2 Which Cisco IOS command displays the backup configuration file stored in NVRAM? answer: Router# show startup-config While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? answer: square brackets - example [yes] What is the first global configuration parameter set when using the setup mode? answer: host name of the router What is the function of the erase startup-config command? answer: It deletes the configuration file in NVRAM You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? answer: copy running-config startup-config Which command will save an active configuration?

answer: copy running-config startup-config How does the router prompt appear when you are in global configuration mode? answer: Router(config)# Where is the next place a router looks if it cannot find the IOS image in flash? answer: TFTP What is the function of the reload command? answer: It reboots the router Which of the following is the correct order in which a router boots and looks fo r files? answer: 1,5,7,6,2,4,3 When setting passwords for vty 0 4, what are you setting a password for? answer: Telnet sessions What is an important function of the power-up self test (POST)? answer: Executes diagnostics that verify the basic operation of router hardware Which password is encrypted in the configuration file by default? answer: Enable secret Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is an important result of the configuration file loading onto a router? answer: Starts routing processes, supplies addresses for interfaces, and sets up media characteristics Where is the configuration file saved when you complete the setup process? answer: NVRAM Once you have selected an interface to configure, which prompt would be on the s creen? answer: Router(config-if)# You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? answer: banner motd Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C Which command is used to copy a system image to a network server? answer: Router# copy flash tftp Which configuration register mode is used to tell the router to boot answer: 0x---1 Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename Which command can be used to check the amount of system memory available? answer: Router# show flash In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets Which type of addressing scheme is formed by MAC addresses? Answer: @A. flat Which address(es) appear in an IP packet's header? Answer: source and destination addresses Which of the following is a benefit of network segmentation? Answer: reduced congestion Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer: 205.255.170.205 Which octet(s) are assigned locally in a class B address? Answer: The third and fourth octets are assigned locally What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? Answer: 6 What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? Answer: subnets

Which class of network addresses allows the borrowing of 15 bits to create subne ts? Answer: Class A Which part of a network layer address does the router use during path determinat ion? Answer: the network address Which of the following represents the use of binary ones in a subnet mask? Answer: subnet and network bits How large is the network/subnet portion of a Class B license having a subnet mas k of 255.255.240.0? Answer: 20 bits How many bits are in an IP address? Answer: 32 How many total subnets can be created if four bits are borrowed from the host fi eld? Answer: 16 What is specified by the network number in an IP address? Answer: the network to which the host belongs Which of the following assists devices on the same network in determining a pack et's final destination? Answer: host ID Which of the following would be the largest possible number expressed by an 8 bi t binary number? Answer: 11111111 Which of the following best describes the address 139.219.255.255 in an unsubnet ted environment? Answer: Class B broadcast address The IP address for a router interface should be part of what? Answer: the network attached to the interface When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? Answer: IP address of the destination host What is the correct term for when routes are learned automatically? Answer: dynamic routing What do bridges and switches use to make data forwarding decisions? Answer: physical addresses Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer: router Which type of routing protocol is RIP? Answer: distance vector Router ARP tables hold information from which of the following? Answer: all networks connected to them What is the most common protocol used to transfer routing information between ro uters located on the same network? Answer: RIP In a connection-oriented system, what happens before any user data is transferre d? Answer: a connection is established between the sender and receiver What happens if a data packet reaches a router that is destined for a network wi th which that router is not directly connected? Answer: The router forwards the packet to another router that most likely contai ns information about the destination. Which of the following contains a unique network number that is used in routing? Answer: IP address Which protocol is used to dynamically assign IP addresses? Answer: DHCP Connection-oriented network processes are often referred to as what? Answer: circuit switched Which describes the changes made to a packet's IP destination address, as that p

acket is passed from router to router on it's way to the destination host? Answer: The destination IP address never changes. Which protocol can find the MAC address of a computer given its IP address? Answer: ARP Why is a static route the preferred method for reaching stub networks? Answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer: proxy ARP Which is an example of a routed protocol? Answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? Answer: transport What do routers use to exchange routing tables and share route information? Answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? Answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? Answer: IGRP In a connectionless system, which of the following is correct? Answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? Answer: IP What are the two proprietary routing protocols developed by Cisco? Answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? Answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer: the domain The Telnet application works mainly at which layers of the OSI model? Answer: application, presentation, and session Which application layer protocol supports e-mail programs? Answer: POP3 What is the language used to create web pages? Answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? Answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? Answer: IP address Which protocol is designed to download or upload files on the Internet? Answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? Answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? Answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? Answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? Answer: DNS

E-mail addresses consist of which two parts? Answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? Answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? Answer: hyperlink What is the data-link destination address of a broadcast message? Answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? Answer: All devices look at the request and ONLY host B will reply with the MAC address Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? Answer: Session Which best describes the structure of a MAC address? Answer: 24 bit vendor code plus 24 bit serial number

3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical 8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask 8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64 8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at

the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless 8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two 8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r. answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process. answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as

sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem? answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data. answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides? answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer

. answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080 8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol 8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal? answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true? answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch?

answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks 8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer? answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain 8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation

8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers? answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN? answer: a. The source device encapsulates data in a frame with the MAC addre ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______ answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI? answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps 8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of

a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm 8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer? answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets? answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename 6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting? answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is

Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 5.9.ARP stands for __________ Answer: A. Address Resolution Protocol 5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head

er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte 14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization 17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record. alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address?

Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b

its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically

Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star

5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security 11. Which topology requires a multipoint connection? answer (d): Bus 12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added 20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer?

Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport 28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero 31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________. Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a

signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise 49. A sine wave is ________. Answer: d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise 55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t

o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line 63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude? Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI 73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32

77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation. Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude 84. Which of the following is most affected by noise? Answer: d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases 89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc

y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM

112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM 119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM 120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications. Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial 125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light

129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables 133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than 136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index 140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical 143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna.

Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch? Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch

164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______. Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end 175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6

182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL 185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data 187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder 195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check

199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded 205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error? Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are 210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N

222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25

244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation 249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______. Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data?

Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP 278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer. Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame. Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV

292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC) 299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID. Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical 311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing.

Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit. Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station . Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the 332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium 336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b) 340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers

346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length. Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches. Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine 366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address?

Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above 386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000

396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______. Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c) 403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point

418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP 423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? Answer: c. n 1 425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing 427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast

443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB 451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______. Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited 461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number

468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket 473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port 486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______.

Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP

503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. Answer: c. Scalability 506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper 507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate. 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above 511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio 513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error.

Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time. Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open 522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent 523. The server program is _______ because it is always available, waiting for a client request. Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open 527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time.

Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program 535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er. Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain

544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain to resolve its IP address? Answer: b. kenz.acct.sony.jp 551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true. 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once 555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register

here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding 561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type 562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG 563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type 565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email. Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above 568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file

572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above 575. A request message always contains _______. Answer: d. A request line and a header 576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number 577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. Answer: a. PUT 579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents 581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP 583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response

587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? Answer: c. Static 592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head 593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute 595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above 597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum

ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE 603. Which category of HTML tags allows the listing of documents? Answer: c. List 604. A program can use _______ to write a CGI program. Answer: d. Any of the above 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static 606. The server receives input from a browser through _______. Answer: b. A form 607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML 609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323

615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression 618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______. Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file. Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive

628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode 632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only 633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm 634. Before a message is encrypted, it is called _______. Answer: d. Plaintext 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher 637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key 639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above

642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509 647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS

655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce 658. A _______ certifies the binding between a public key and its owner. Answer: c. CA 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH

668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______. Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer level. Answer: c. IPSec 673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy. Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid

681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits 5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses. Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets 10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded? Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol? Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet

Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop? Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above. 11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol. Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP? Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______. Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited 3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der? Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea

Answer: C)

Length of header

9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence 12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application program. Answer: C) Socket 15 INCORRECT The _______ field is used to order packets of a message. Answer: A) Sequence number 16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a

ddress? Answer: D.

EEPROM

3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25 Answer: C. Centronics-50 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Answer: C. Repeater 9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment 10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC

15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? Answer: C. Coax 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer: A. Print server 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. Answer: B. RG-58 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus

7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP 12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Answer: D. Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? Answer: B. NAS devices are less expensive. 16. used on Answer: 17. Answer: An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500

18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Answer: B. NIC In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network

Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN

The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash 14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention? answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS 17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server 19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM? answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash 26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use?

answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet. Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address. If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time. What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router

through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination? answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs? answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers?

answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP? answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1 answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet

mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error? answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0 Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing? answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table?

answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards? answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM. Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries? answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay. When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20 Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires?

answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing? answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2 Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a

VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree 003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors 004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field. answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size 009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1

016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP 020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec 021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process 022. Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control 023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet. answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack?

answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____ answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8

Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011 The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______. answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium The information to be communicated in a data communications system is the ______ . answer: Message Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing

In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented _____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP Thick Ethernet can be extended to _____ meters per segment answer: 500 _____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____

answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___ _ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____ _ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called .. answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise ______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status

A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10

In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21

The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process.

Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error

Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55

In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is?

Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1

Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88

Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte

rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth?

Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120

HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA

Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. .

Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? .

Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? meters per segment. protocol for communication over point

Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 . . . .

Connection establishment in TCP is called Answer: three-way Question 177

handshaking.

In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187

In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized.

Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5%

21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network

7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP

2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da

ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct?

Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair

Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are:

Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R

2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment.

Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP

. In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer:

31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a

nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer

The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver

_____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless

TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on:

Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks

Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n

umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct?

Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer

._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment

. Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer.

How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____.

Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers

What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP

Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu

mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig

n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro

ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers.

Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic

answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called...

answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer?

Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table.

Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32

What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs?

Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP

Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode.

Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76

The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because

Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative

Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript

Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730]

Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131

The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point .

Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag .

Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping meters per segment. protocol for communication over point

Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first . . . .

Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking.

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains

Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____.

Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet

18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor

t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer

Answer: 4. Answer: 5. Answer: 6. Answer:

Physical Which cable type used for segment lenth more than 2000m. Fiber optics What network device decreases collision switch Transceiver _____specifies a physical star topology central hub . Twisted-pair

1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0

19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents

11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an

d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours

In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection?

Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___

Answer: 31. ed-pair a. b. c. d. 32. Answer: 33. Answer: 34. nswer. Answer: 35. Answer:

uses buffers ___ specifies a physical star topology featuring a central hub and twist cable as the medium. 10BASE-T 10BASE5 10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a fixed number of blocks In ___ resolution, the resolver expects the server to supply the final a recursive By default, FTP uses which ports? 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol

Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila

r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct

5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state

Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP

11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is

Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho

sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame

before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer.

Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN

As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server

In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat

a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a

ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume

nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___

Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong

estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN

Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is

Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for

Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble.

The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The

first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment.

Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live

The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time

Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s,

Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet.

Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t

he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD

Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market

1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp

onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination

over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive

Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible.

Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48

How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in

Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70

When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP

networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP

Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was

downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113

The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to

Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two

packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed .

Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina protocol for communication over point .

ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header . . meters per segment.

Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. . .

Question 180 In RTP, are used to number the packets of a real-time transmission.

Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt

e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP

8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route

26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this?

Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization.

Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T

CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er.

Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct

16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following? Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation?

Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed? Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion? Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps? Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching? Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets?

Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers? Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity? Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols? Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur? Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers? Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router? Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates? Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded?

Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27? Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list? Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs? Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2? Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address? Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing? Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six

Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates. Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network? Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1 Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer? Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure?

Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following? Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs? Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off? Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols? Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward

Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork? Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices?

Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table? Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request? Answer: #Ping 8. If Acme Inc. occupies the first three floors of a building and each flo or is 1500 square meters, how many wiring closets should be installed answer: six 8. What is the first step in locating a wiring closet for a network? answer: Identify on a floor plan, all devices that will be connected to the netw ork. 8. What kind of power disturbances can be caused by strikes? answer: surges 8. What network device is used in an extended star topology when the catchment a rea of one wiring closet is not enough? answer: repeatter 8. What is a common cause of oscillation often called harmonics? answer: excessively long electrical wiring runs 8. Why are common mode problems a hazard to you or your computer? answer: They go directly to the computer chassis. 8. Where should the main distribution facility (MDF) be located in a multi-story building using an extended star topology? answer: on one of the middle floors 8. What best describes the difference between alternating and direct current? answer: DC flows at a constant value, whereas AC rises and falls. 8. How does AC line noise create problems? answer: by adding unwanted voltage to the desired signals 8. What is the "one-hand rule?" answer: Only touch electrical devices with one hand at a time to prevent electri city from flowing through the body. 8. Which type of networking media is now installed most often for backbone cabli ng? answer: 62.5/125 micron fiber-optic cable 8.Which of the following is a source that can produce interference on UTP cable? answer: fluorescent lights

8. Why are split pairs a problem for network installations? answer: The wires are part of different circuits so signals are not protected an d cross-talk occurs. 8. When should cable not be routed in an existing raceway?if it already contains a power cable answer: if it already contains a power cable 8. What is the central junction for the network cable? answer: wiring closet 8. What should be used to mount cable to a wall? answer: tie wraps 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: IDFs 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: Wear baggy clothes. 8. What tool would you use to attach CAT5 cable to a patch panel? answer: punch tool 8. What is one advantage of using distribution racks for mounting patch panels? answer: allows easy access to both the front and back of the equipment 8. Why is the wiring sequence critical when RJ-45 jacks are used at the telecomm unications outlet in a horizontal cabling scheme? answer: For the network to function properly. 8. What is the most important thing to do before you work in walls, ceilings or attics? answer: Turn off power to the area. 8. What kind of jack must be used for making a connection to a Category 5 unshie lded twisted pair cable in a horizontal cabling scheme? answer: RJ-45 8.Why shouldn't you install a jack in the bottom five centimeters of a wooden ba seboard? answer: The bottom plate of the wall will prevent you from pushing the box 8. Which of the following describes a cable tester measurement of signal attenua tion? answer: It measures the reduction in power of a signal received from a signal in jector. 8. How is an RJ-45 jack surface mounted? answer: adhesive backed or screw box 8. What is the first thing you should do if near-end crosstalk is detected? answer: Visually check the horizontal cabling. 8.Which best describes a patch panel's function? answer: It acts as a switchboard where horizontal cabling from workstations can be connected to other devices to form a LAN. 8. How many pins are on each of the ports of a patch panel? answer: 8 pins 8. What should be done when preparing to run cable? answer:Label the boxes and cable. 8. What kind of a cable must you use when laying cable through spaces where air is circulated? answer: fire rated 8. How does a cable tester (a TDR) measure distance? answer: It times the signal sent towards and reflected back from the end of an o pen-ended cable 8. What type of raceway should be used if it will be visible in the room? answer: decorative 8. Why is establishing a baseline performance level for a network important? answer: for future periodic testing of the network and diagnostics 8.What is a rough diagram that shows where the cable runs are located called? answer: cut sheet 8. When running cable from the wiring closet to wall jacks, where is the cable i

tself labeled? answer: at each end 8. What characteristic must hosts on a network possess in order to communicate d irectly ? answer:same network ID 8. Which of the following describes the effect of subnetting on the amount of br oadcast traffic? answer: decreases it, because broadcasts are not forwarded outside a subnet 8. Which of the following correctly describes an ISP? answer: Internet Service Provider 8.Which of the following is an example of a Class C broadcast address? answer: 221.218.253.255 8. What is decimal number 164 in binary? answer: 10100100 8. Which of the following is the approximate number of hosts supported in a answer:65 thousand 8. Which of the following describes the relationship between path determination and the routing of packets? answer: they are the same process 8. Which OSI layer adds an IP header? answer: Layer 3 8.Which type of addressing scheme is formed by MAC addresses? answer: flat 8. Which address(es) appear in an IP packet's header? answer: source and destination addresses 8. Which of the following is a benefit of network segmentation? answer: reduced congestion 8. Which of the following would be the decimal value of the binary IP address 11 001101.11111111.10101010.11001101? answer: 205.255.170.205 Why is a static route the preferred method for reaching stub networks? answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? answer: proxy ARP Which is an example of a routed protocol? answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? answer: transport What do routers use to exchange routing tables and share route information? answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? answer: IGRP In a connectionless system, which of the following is correct? answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? answer: IP What are the two proprietary routing protocols developed by Cisco?

answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? answer: the domain The Telnet application works mainly at which layers of the OSI model? answer: application, presentation, and session Which application layer protocol supports e-mail programs? answer: POP3 What is the language used to create web pages? answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? answer: IP address Which protocol is designed to download or upload files on the Internet? answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? answer: DNS E-mail addresses consist of which two parts? answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? answer: hyperlink What is the data-link destination address of a broadcast message?

answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? answer: All devices look at the request and ONLY host B will reply with the MAC address. Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? answer: Session Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number ////////// 1. What is the framing method used in PPP? answer: byte stuffing 2. Assumme the RTT 200ms, the transmission time of a Web object 10ms,how long do es it take answer: 410ms 3. FPT uses port 21 for sending answer: Identification and password...data file 4. In the exponential backoff phase of CSMA/CD, after n collisions of a frame, t he adapter then waits K x 512 bit answer: {0,1,2,...,2m-1} where m=min(n,10) 5. In the PPP frame, the........... field defines answer: FCS 6. Main reason of packet loss in the Internet is...... answer: Routers drop packets because their buffers are full 7. The Link State (LS) algorithm results in....... answer: The least cost path fromm one node to all nodes in the network 8. What are the two methods of circuit switching for dividing answer: FDM and TDM 9. In the DNS, the names are defined in .......... structure answer: A tree 10. What is the protocol that network devices answer: DHCP 11. A name server is....... for a host if it always has a DNS record that answer: Authoritative 12. In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link 13. Two-dimensional parity check can......... answer: Detect a single bit error and correct it 14. Which statement is correct about packet switching and circuit switching answer: With the same delay performance, packet-switching allows more number of users than circuit switching 15. Why CSMA/CD is not used in Wifi? answer: Because of the hiden terminal problem and fading problem 16. When CRC is calculated consider the 4-bit generator G=1001 and suppose that D has the value 111010. answer: 101 17. Those followings answer: TCP congestion control 18. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of Ip addresses that can be assigned to this subnet answer: 129.17.129.96-129.17.129.127 19. Which delay mainly depends on the congestion of the network? answer: congesting delay 20. What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unittime 21. Traceroute command uses

answer: ICMP 22. Which one is correct about P2P network? answer: A user computer can be both client and server 23. Generic router architecture includes answer: All of them 24. The core of the internet consist of answer: Routers 25. Very popular browser-based email services such as Hotmail or Yahoo! answer: HTTP 26. There are 4 serial links between the client and the server, with the transmi ssion rates being 1Mbps, 3Mbps, 2 Mbps answer: 0.5 Mbps 27. Which of the following is the Mac protocol answer: CSMA/CD 28. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the first collision of a frame, the adapter then waits.... answer: 512 microseconds 29. IMAP is designed to allow users to manipulate......., so it is more..... tha n POP3 answer: Remote mailboxes...complex 30. CSMA/CA belong.....group, one of three broad classes of MAC protocols answer: Random access 31. What is incorrect about Web cache (proxy server)? answer: Web caches can improve in Internet performance in general 32. The transport layer protocol provides logical communication between....runni ng on different hosts, while the network layer protocol provides logical communi cation between..... answer: Processes...Hosts 33. In TCP congestion control, two important variables the sender has to keep tr ack are answer: Congestion window and socket number 34. In IP fragmentation, a datagram is fragmented into two packets, the the firs t packet has answer: Offset=0 and FragFlag=1 35. rdt3.0 provides reliable data transfer over a ........... answer: Lossy channel with bit errors 36. The time-to-live (TTL) field in the datagram is included to insure that data grams....... answer: Do not circulate forever in the network 37. A datagram is fragmented into three smaller datagrams. Which of the followin g is true? answer: The identification field is the same for all three datagrams 38. Each TCP segment has ......bytes of header overhead where as UDP has.... byt es of overhead. answer: 20...8 39. In OSI model, as data packet moves from the lower to the upper layer header are .... answer: removed 40. Which one is correct about Denial of Service (DOS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic. 41. Which statement is correct about router? answer: Each interface to have an unique IP address. 42. Which of the following is hybrid of client-server and P2P? answer: Skype 43. Channel partitioning, random access, and taking turns are ..... answer: Mac protocols 44. The broadcast MAC address in Lan is answer: FF-FF-FF-FF-FF-FF 45. The DNS protocol runs over ........... and uses port .................

answer: UDP...53 46. In Congestion avoidance of TCP flow control, if timeout occurs while the cur rent congestion window size is 16, the congestion window will answer: Remain 16 47. What is the total delay for transmission of 1.25 megabytes of images over fi ber optic cable with distance of 3000km with transmission rate of 1 Gbps answer: 20msec 48. Which one is not in UDP segment header? answer: Receiving Window Size 49. The ........... that together implement the DNS distributed database, store .......... for the hostname to IP address mappings. answer: Authoritative servers .....Entries 50. What is Not a function of a router? answer: Working with IP address. 51. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in but before the rest of frame has arrived 52. The purpose of ICMP echo request and ICMP echo relay messages is to...... answer: report errors 53. This job of delivering the data in a .....to the correct.........is called d e-multiplexing answer: tranport-layer segment....application process 54. The combination of an IP address and a port number is called a.... answer: socket 55. Which layer in the Internet that connects directly to wire? answer: Physical 56. ......... is a supplementary protocol that allows non-ASCII data to be sent through email. answer: MIME 57. ......Applications typically uses......... answer: Elastic....DNS 58. In TCP, what can happen if the timeout is smaller than the connection's roun d-trip time? answer: It can result in unnecessary retransmissions 59. Which of the following is the pipelining protocol answer: Selective Repeat 60. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer: 201.14.78.64 1. What is the framing method used in PPP? answer: byte stuffing 2. Assumme the RTT 200ms, the transmission time of a Web object 10ms,how long do es it take answer: 410ms 3. FPT uses port 21 for sending answer: Identification and password...data file 4. In the exponential backoff phase of CSMA/CD, after n collisions of a frame, t he adapter then waits K x 512 bit answer: {0,1,2,...,2m-1} where m=min(n,10) 5. In the PPP frame, the........... field defines answer: FCS 6. Main reason of packet loss in the Internet is...... answer: Routers drop packets because their buffers are full 7. The Link State (LS) algorithm results in....... answer: The least cost path fromm one node to all nodes in the network 8. What are the two methods of circuit switching for dividing answer: FDM and TDM 9. In the DNS, the names are defined in .......... structure answer: A tree 10. What is the protocol that network devices

answer: DHCP 11. A name server is....... for a host if it always has a DNS record that answer: Authoritative 12. In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link 13. Two-dimensional parity check can......... answer: Detect a single bit error and correct it 14. Which statement is correct about packet switching and circuit switching answer: With the same delay performance, packet-switching allows more number of users than circuit switching 15. Why CSMA/CD is not used in Wifi? answer: Because of the hiden terminal problem and fading problem 16. When CRC is calculated consider the 4-bit generator G=1001 and suppose that D has the value 111010. answer: 101 17. Those followings answer: TCP congestion control 18. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of Ip addresses that can be assigned to this subnet answer: 129.17.129.96-129.17.129.127 19. Which delay mainly depends on the congestion of the network? answer: congesting delay 20. What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unittime 21. Traceroute command uses answer: ICMP 22. Which one is correct about P2P network? answer: A user computer can be both client and server 23. Generic router architecture includes answer: All of them 24. The core of the internet consist of answer: Routers 25. Very popular browser-based email services such as Hotmail or Yahoo! answer: HTTP 26. There are 4 serial links between the client and the server, with the transmi ssion rates being 1Mbps, 3Mbps, 2 Mbps answer: 0.5 Mbps 27. Which of the following is the Mac protocol answer: CSMA/CD 28. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the first collision of a frame, the adapter then waits.... answer: 512 microseconds 29. IMAP is designed to allow users to manipulate......., so it is more..... tha n POP3 answer: Remote mailboxes...complex 30. CSMA/CA belong.....group, one of three broad classes of MAC protocols answer: Random access 31. What is incorrect about Web cache (proxy server)? answer: Web caches can improve in Internet performance in general 32. The transport layer protocol provides logical communication between....runni ng on different hosts, while the network layer protocol provides logical communi cation between..... answer: Processes...Hosts 33. In TCP congestion control, two important variables the sender has to keep tr ack are answer: Congestion window and socket number 34. In IP fragmentation, a datagram is fragmented into two packets, the the firs t packet has answer: Offset=0 and FragFlag=1 35. rdt3.0 provides reliable data transfer over a ...........

answer: Lossy channel with bit errors 36. The time-to-live (TTL) field in the datagram is included to insure that data grams....... answer: Do not circulate forever in the network 37. A datagram is fragmented into three smaller datagrams. Which of the followin g is true? answer: The identification field is the same for all three datagrams 38. Each TCP segment has ......bytes of header overhead where as UDP has.... byt es of overhead. answer: 20...8 39. In OSI model, as data packet moves from the lower to the upper layer header are .... answer: removed 40. Which one is correct about Denial of Service (DOS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic. 41. Which statement is correct about router? answer: Each interface to have an unique IP address. 42. Which of the following is hybrid of client-server and P2P? answer: Skype 43. Channel partitioning, random access, and taking turns are ..... answer: Mac protocols 44. The broadcast MAC address in Lan is answer: FF-FF-FF-FF-FF-FF 45. The DNS protocol runs over ........... and uses port ................. answer: UDP...53 46. In Congestion avoidance of TCP flow control, if timeout occurs while the cur rent congestion window size is 16, the congestion window will answer: Remain 16 47. What is the total delay for transmission of 1.25 megabytes of images over fi ber optic cable with distance of 3000km with transmission rate of 1 Gbps answer: 20msec 48. Which one is not in UDP segment header? answer: Receiving Window Size 49. The ........... that together implement the DNS distributed database, store .......... for the hostname to IP address mappings. answer: Authoritative servers .....Entries 50. What is Not a function of a router? answer: Working with IP address. 51. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in but before the rest of frame has arrived 52. The purpose of ICMP echo request and ICMP echo relay messages is to...... answer: report errors 53. This job of delivering the data in a .....to the correct.........is called d e-multiplexing answer: tranport-layer segment....application process 54. The combination of an IP address and a port number is called a.... answer: socket 55. Which layer in the Internet that connects directly to wire? answer: Physical 56. ......... is a supplementary protocol that allows non-ASCII data to be sent through email. answer: MIME 57. ......Applications typically uses......... answer: Elastic....DNS 58. In TCP, what can happen if the timeout is smaller than the connection's roun d-trip time? answer: It can result in unnecessary retransmissions 59. Which of the following is the pipelining protocol

answer: Selective Repeat 60. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer: 201.14.78.64 Quiz 1 1. One important role of the Network Layer is to: answer :D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : answer :B. Local area networks(LAN) 3. One important role of the Transport Layer is to: answer :B. to multiplex and de-multiplex messages 4. Ethernet is answer :B. a type of LAN (Local area networks) 5. The difference between TCP and UDP is : answer :A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT are for implementing: answer :B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: answer :D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST ) answer :B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: answer :C. Internet and Local area networks Quiz 2 1. in sliding window Flow control with window size of W, the source _____ answer :sends up to W frames without ACK 2. Flow control____ answer :ensures the sender does not too much data that may overwhelm the receive / has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack?

answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R 2.1.Which one is correct about P2P network? answer :A user computer can be both client and server 2.2.HTTP uses the services of _________ on well-known port 80. answer :TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er answer :TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP?

answer :The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? answer :All of the others 2.7.SMTP stands for answer :Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 2.9.IMAP and POP are_________ answer :Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. answer :MIME 3.1.TCP provides __________between application processes running on different ho sts answer :Logical communications 3.2.What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver 3.3.In the transport layer, the job of gathering data at the source host from di fferent application processes, enveloping the data with header information to cr eate segments, and passing the segments to the network layer is called _______. answer :Multiplexing 3.4.In the ________ algorithm of the TCP congestion control, the size of the con gestion window increases exponentially until timeout answer :Slow start 3.5.If the segment has sequence number of 128 and length of 8 bytes, the receivi ng computer will send ACK with value of _________ answer :136 3.6.Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not 3.7.What flag is used to close TCP connection? answer :FIN 3.8.The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel 3.9.TCP is a ___________ protocol. answer :Connection-oriented 3.10.TCP assigns a sequence number to each segment that is being sent. The seque nce number for each segment is the number of the _______ byte carried in that se gment. answer :First 4.1.What is the data unit used in Internet Protocol (IP)? answer :Datagram 4.2.DHCP is used by the server to: answer :Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? answer :32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? answer :All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) answer :2 4.6.Traceroute command uses answer :ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm 4.8.Routers operate in the _______ layers. answer :network

4.9.Dijkstra s algorithm is answer :A link-state routing algorithm 4.10.Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder answer :0000 5.2.______ is (are) (an) example(s) of random access MAC answer :All of them 5.3.In cyclic redundancy checking, what is CRC answer :the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN 5.5.What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet answer :CSMA/CD 5.7.Which one is the flag used for framing in PPP? answer :01111110 5.8.Which one can be a MAC address? answer :00-D0-56-F2-B5-12 5.9.ARP stands for __________ answer :Address Resolution Protocol 5.10.Parity checking _____. answer :can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests answer :proxy 2. The_______usually contains the sender address,the receiver address,and other information answer :envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. answer :base64 4. By default,FTP uses which ports? answer :20 and 21 5. HTTP uses the services of______on well-known port 80 answer :TCP 6. In the DNS, the names are defined in_________structure answer :an inverted-tree 7. _________is a language for creating Web pages. answer :HTML 8. With WWW as an example of client-server computer software,the server is: answer :The machine that makes WWW documents available. 9. A________document is created by a Web server whenever a browser requests the document. answer :dynamic 10. In a________connection,the server leaves the connection open for more reque sts after sending a response. answer :persistent 11. Which of the following statement is correct? answer :Full-Duplex :Communications in which both sender and receiver can send a t the same time 12. In cyclic redundancy checking,what is CRC answer :the remainder 13. IP is________datagram protocol answer :unreliable 14. In the________algorithm the size of the congestion window increases exponen

tially until it reaches a threshold. answer :slow start 15. TCP uses___________to check the safe and sound arrival of data. answer :an acknowledgment mechanism 16. In the OSI model,encryption and decryption are functions of the________layer . answer :presentation 17. In________resolution,the resolver expects the server to supply the final . answer :recursive 18. The purpose of echo request and echo reply is to answer :check node-to-node communication 19. HDLC is a_______protocol answer :bit-oriented 20. To accomplish flow control,TCP uses a_________window protocol. answer :sliding 21. TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. answer :stream ;stream 22. In sliding window flow control,if the window size is 63.What the range seque nce numbers? answer :0 to 63 23.In the OSI model,what is the main function of the transport layer? answer :process-to-perocess message delivery 24. Why was the OSI model developed? answer :standards were needed to allow any two systems to communicate 25. ________is more powerful and complex than______ answer :IMAP4;POP3 26. In moderm implementations of TCP,a retransmission occurs if the retransmissi on timer expiersor_______duplicate ACK segment have arrived answer :three 27. _______is the protocol suite for the current Internet answer :TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ answer :protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. answer :none is correct 30. To accomplish flow control,TCP uses a______window protocol. B answer :sliding 31. What network device decreases collision? answer :SWITCH 32.At the CRC generate,_______added the data unit before division process answer :0s are 33. Jitter is introduced in real-time data by the______ answer :delay between packets 34. What does the URL need to access a document answer :all are correct 35.What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer :DHCP 36. What flag is used to close TCP connection? answer :FIN 37.Maximum number of data flow through in N-port switch (LAN switch L2): answer : N/2 38. Base on distance, two MOST IMPORTANT types of computer network are: answer :Internet and local area network.

39. One important role of the Network Layer is to: answer :Perform network routing, i.e., to find the most efficient transmission r oute between two computers. 40. One important role of Transport Layer is to: answer :To multiplex and de-multiplex messages. 41. The difference between TCP and UDP is : answer :TCP is a protocol in Network Layer while UDP is in the Transport Layer. 42. Ethernet is answer :A type of LAN 43. As learned in class, computer networks are classified based on: answer :Distance, switching 44. Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g : 54 Mpbs belong to: answer :LAN 45. DHCP is used to answer :Assigned IP addresses automatically 46. A binary file is 3375 bytes long. How long will it be if encoded using base6 4 encoding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? answer :4604

What type of service that VC network provides? (A) answer :Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. answer :bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? answer :18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. answer :OSI ___ audio/video refers to on-demand request for compressed audio/video files. answer :Interactive If ASCII character H is sent and the character I is received, what type of error s is this? answer :single-bit If ASCII character D is sent and the character G is received, what type of error s is this?

answer :multiple-bit What type of routing protocol that BGP is? answer :Link State Routing A bridge has access to the ___ address of a station on the same network. answer :physical The ___ layer is responsible for the delivery of a message form one process to a nother. answer :transport Routers function in the ___ layers. (A) answer :none is correct/data link and network The purpose of MTA is answer :Transferall of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? answer :strict source route What is the service that the UDP protocol provides? (C) answer :error detection What is information used to route packet in network? answer :destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) answer :uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. answer :10BASE-T The ____ domains define registered hosts according to their generic behaviour answer :Generic

A packet whose destination is outside the local TCP/IP network segment is sent t o the answer :Default gateway Which piece of information is not vital for a computer in a TCP/IP network? answer :DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. answer :removed

Session layer of the OSI model provides answer :Dialog control IPv6 has _______ -bit addresses. answer :128 Which of the following can be an Ethernet physical address? answer :07:01:02:01:2C:4B An IP address contains________ bits ? answer :32 Which routing protocol below is used by exterior routers between the autonomous systems? answer :BGP Which of the IP headers decides when the packet should be discarded? answer :TTL(time-to-live) Which IP address is reserved for software loop-back? answer :127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? answer :190.148 Which port is reserved for use of the SMTP protocol? answer :25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? answer :62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? answer :Assignment of more IP addresses Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and elect ronic signaling speccifications? answer :EIA 2. In the OSI model, which layer functions as a liaison between user support lay ers and network support layers? answer :Transport layer 3. The Physical layer is connected with the movement of____over the physical med ium. answer :Bits 4. Which of the following statement is correct? answer :Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? a. To develop LAN standards 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are____ answer :Removed 7. Which of the following is an appropriate description concerning B2C? answer :Ordering books online 8. Which of the following is an appropriate description concerning mobile networ k users? answer :A notebook computer used in a class 9. In the OSI model, encryption and decryption are functions of the_____layer. answer :Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of er

ror is this? answer :Burst 2. At the CRC generate, added the data unit before division process. answer :0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state answer :Establishing 4. According to the PPP transition state datagram, verification of user identifi cation occurs in the state answer :Authenticating 5. At the CRC checker,______if the data unit is damaged. answer :A nonzero remainder 6. HDLC is a________protocol answer :Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of er ror is this? answer :Single-bit 8. In cyclic redundancy checking, what is CRC answer :The remainder 9. In sliding window flow control, if the size is 63, what the range sequence nu mbers? a. 0 to 63 10. What is present in the HDLC control fiels for I-frame a. All are correct 11. G At the CRC generate, ___ added the data unit before division process. Answer :0s are Quiz Chapter4 1. What device can . answer :All 2. Maximun of data flow through in N-port switch (an with L2) answer :N 3. How many collision domains has the computer with 88 computers, 10hubs and 2 r epeaters? answer :1 4. Repeaters function in the layer answer :Physical 5. Which cable type used for segment lenth more than 2000m. answer :Fiber optics 6. What network device decreases collision switch answer :Transceiver 7. _____specifies a physical star topology central hub . answer :Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to a ssign IP address to PCs in LAN automatically? answer :DHCP 2. What is information used to route packet in network? answer :Destination Address fields in IP header 3. What type of routing algorithm that OSPF use? answer :Shortest Path Routing 4. What does the IP header s protocol field identify? answer :The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer :All are correct 6. IP is________datagram protocol answer :Both a and b

7. In classless addressing,_______is assigned to an organization. answer :A variable-length block 8. Which layer does ICMP reside in? answer :Physical 9. DHCP is used to: answer :Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP? answer :ICMP 11. In classless addressing, the ______ is another name for the common part of the address range. answer :prefix 12 In classless addressing, the _______ is the varying part (similar to the hostid). answer : suffix 13 In classless addressing, the prefix length defines the _____________. answer :mask 14 The number of addresses assigned to an organization in classless address ing _______. answer : must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. answer : must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? answer : 2.4.6.64

17 Which address could be the beginning address of a block of 16 classless addresses? answer :none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? answer : 2.4.6.0 19. What type of routing protocol that BGP is? answer :Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? answer :Segment 2. What is the service that the UDP protocol provides? answer :Guaranteed delivery 3. What flag is used to close TCP connection? answer :FIN 4. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer :Uses buffers 5. The difference between TCP and UDP is primarily answer :One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and allows t he receiving process to obtain data as a_____of bytes. answer :Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. answer :An acknowledgment mechanism

8. TCP is a (n)__________transport protocol. answer :Reliable 9. What is the combination of an IP address and a port number called? answer :A socket 10. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a answer :Randomly generated number Quiz Chapter7 1. ______is used to compress video. answer :JPEG 2. According to the Nyquist theorem, we need to sample an analog signal______tim es the highest frequency. answer :Two 3. ______is more powerful and complex than______. answer :IMAP4; POP3 4. What does the URL need to acess a document answer :All are correct 5. The purpose of MTA is answer :Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests the doc ument. answer :Static 7. With WWW as an example of client-server computer software, the server is: answer :The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer :Streaming stored 9. In______resolution, the resolver expects the server to supply the final . answer :Recursive 10. By default, FTP uses which ports? answer :20 and 21 11 . Currently two message access protocols are available:_____ and_____. answer :POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : answer :The machine that you use to display WWW documents Quiz 1 1. One important role of the Network Layer is to: answer :D.Perform network routing, i.e., to find the most efficient transmission route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : answer :B. Local area networks(LAN) 3. One important role of the Transport Layer is to: answer :B. to multiplex and de-multiplex messages 4. Ethernet is answer :B. a type of LAN (Local area networks) 5. The difference between TCP and UDP is : answer :A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections

6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT are for implementing: answer :B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: answer :D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST ) answer :B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: answer :C. Internet and Local area networks Quiz 2 1. in sliding window Flow control with window size of W, the source _____ answer :D. sends up to W frames without ACK 2. Flow control____ answer :B. ensures the sender does not too much data that may overwhelm the rece ive / D. has two techniques : Stop and Wait and Sliding window 3. In Stop and Wait Flow control, source____ answer :B. waits for the acknowledgment(ACK) before sending next frame 4. At the CRC checker, ____ if the data unit is damaged answer :D. a nonzero remainder 5. CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ w hile CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ answer :A. Ethernet__ Wireless Lan 7.If ASCII character H is sent and the character I is received, what type of err or is this? answer :a. Single-bit 8. Parity checking ___ answer :C. can detect a single bit error in a transmission 9. If ASCII character G is sent and the character D is received, what type of er ror is this? answer :d. Burst Quiz 3 1. IP address written as 200.23.16.0/23 means: answer :C. both are correct 2. A Virtual Circuit consists of answer :D. all are correct 3. What is the last address of a block of classless address if one of the addres ses is 12.22.2.127/28 answer :D. none of them 4. In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram answer :B. 2

5. What are general functions of router? answer :D. all are correct 6. An organization is granted a block of classless addresses with the starting a ddress 199.34.76.128/29. How many addresses are granted? answer :B. 8 7. Bridges function in the ___ layers answer :A. physical and data link 8. The time to live field in IP datagram answer :C. both are correct 9. NAT router must answer :C. both are correct 10. In a Datagram networks answer :D. all are correct 11. How big is an IPv6 Internet address? answer :A. 128 bits 12. Which field in the IP header is used to prevent an IP packet from continuous ly looping through a network answer :C. time to live 13. Assume that the IP address has only 8 bits, first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnet can be addressed answer :B. 32 subnets and 8 hosts 14. What is tha data unit used in Internet Protocol(IP) answer :C. datagram 15. Which device can amplify and make signal to all computer in LAN answer :C. repeater 16. What is the protocol that network devices ( for example: modem ADSL) use to assign IP address to PCs in LAN automatically answer :B. DHCP Quiz 4 1. TCP is a(an)____ transport protocol answer :C. reliable 2. What is WRONG about UDP? answer :D. Use ACK to notify the sender that the packet has arrived the receiver 3. In Congestion avoidance of TCP congestion control, when timeout occurs, the c ongestion window _____ answer :C. Reduce to 1 4. In modern implementations of TCP, a retransmission occurs if the retransmissi on timer expires or ___ duplicate ACK segments have arrived answer :C. three 5. Those following: a) Slow start b) Congestion avoidance Fast recovery, are mechanisms of______ answer :A. TCP congestion control c) fast retransmit d)

6. If the segment has sequence number of 128 and length of 8 bytes, the receivin g computer will send ACK with value of answer :C. 136 8. What flag is used to close TCP connection? answer :B. FIN 9. In TCP congestion control, when timeout occurs answer :D. The threshold congestion window will be set to half of the current wi ndow size 10. What is the data unit used in TCP answer :A. Segment 11. What is the combination of an IP address and a port number called? answer :A. A socket 12. In the ____ stage of the TCP congestion control, the size of the congestion window increase exponentially until timeout occur. answer :C. slow start 13. The value of the acknowledgment field in a segment defines the number of the ___ bytes a party expects to receive answer :C. next 14. The difference between TCP and UDP is primarily answer :B. One is connection-oriented, one is connectionless 15. TCP assigns a sequence number to each segment that is being sent. The sequen ce number for each segment is the number of the ___ byte carried in that segment answer :A. first Quiz 5 1. In HTTP, a ______ server is a computer that keeps copies of responses to rece nt requests answer :B.proxy 2. With WWW as an example of client-server computer software,the server is: answer :A. The machine that makes WWW documents available. 3. In a________ connection, the server leaves the connection open for more reque sts after sending a response. answer :A.persistent 4. _____ is a language for creating Web pages answer :B. HTML 5. In the ______encoding scheme, 24 bits become 4 characters,and eventually are sent as 32 bits. answer :C. base64 5. HTTP uses the services of______on well-known port 80 answer :C. TCP 7. What is the total delay for transmission of 2000Mb of text over fiber cable w ith distance of 3000km with transmission rate of 2Gbps (ignore all other delay) answer :C. 10msec 8. Which layer does ICMP functions?

answer :D. network layer 9. A ________ document is created by a Web server whenever a browser requests t he document. answer :B. dynamic 10. Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is us ed in Ethernet) can NOT be used in Wireless LAN answer :D. both of them 11. Which statement is best correct about UDP and TCP? answer :D. all of them 12. A sequence of 72 bits, after encoding using BASE64, become a sequence of answer :A. 96 bits 13. By default, FTP uses which ports? answer :a. 20 and 21 14. In the DNS, the names are defined in_________structure answer :B. an inverted-tree Quiz 6 1. Which one best describes the advantage(s) of using cache in proxy server? answer :A. Reduce the delay time to download content from the remove a remove we b server 2. In cyclic redundancy checking, what is CRC answer :C. the remainder 3. In sliding window flow control. If the window size is 63. What the range sequ ence numbers? answer :C. 0 to 63 4. IP is _____ datagram protocol answer :C. both a and b 5. TCP uses __________ to check the safe and sound arrival of data answer :A. an acknowledgment mechanism 6. Which one is best correct for IMAP(Internet Mail Access Protocol) answer :D. All of them 7. HDLC is a ________ protocol answer :B. bit-oriented 8. Protocol used to exchange email between email server is: answer :C. SMTP 9. In the OSI model, encryption and decryption are functions of the ____ layer answer :B. presentation 10. The purpose of echo request and echo reply is to answer :B. check node-to-node communication 11. To accomplish flow control, TCP uses a___________ window protocol answer :B. sliding

12. Which of the following statement is correct? answer :C. Full-Duplex: communication in which both sender and receiver can send at the same time. 13. In______ resolution, the resolve expects the server to supply the final answer :B. recursive 14. If the ACK value is 200, then byte_____ has been received successfully answer :A.199 15. Which one is the returned code of the response from a web server when a clie nt successful connects to the web server answer :C. 200

Quiz 7 1. ______ algorithms are more efficient for short messages answer :D. Asymmetric-key 2. Which field in the IP header is used to prevent an IP packet from continuousl y looping through a network? answer :A. Time to live 3. How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :B. The summation of Two Round Trip and the Transmission Time 4. Which one is best correct about symmetric-key cryptography and asymmetric-key cryptography? answer :A. Symmetric-key cryptography has the same key both sender and receiver while asymmetric-key not 5. What are general functions of router? answer :D. All are correct 6.What type of service that VC network provide? answer :A. Connection-oriented 7. The purpose of MTA (Mail Transfer Agent) is answer :C. Transferal of message across the Internet 8. We can divide audio and video services into ____ broad categories. answer :A. three 9. A three-character data frame: A FLAG B when framing methods using Flag bytes with stuffing, the output will be: answer :A. A ESC FLAG B 10. Which protocol helps to transfer non-plain text files such as image or audio files via SMTP email systems? answer :C. MINE 11. Which statement is correct about Error Control in TCP/IP model answer :A. Error Control is implemented in both Data Layer and Transport Layer

12. What is the IP address used to test a PC s network card that don t need connect PC to another PC? answer :D. all are correct 13. A _____ server loads all information from the primary server answer :B. secondary 14. The value of receiving window size is determined by ____ answer :B. the receiver 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R

2.1.Which one is correct about P2P network? answer :A user computer can be both client and server 2.2.HTTP uses the services of _________ on well-known port 80. answer :TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er answer :TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? answer :All of the others 2.7.SMTP stands for answer :Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 2.9.IMAP and POP are_________

answer :Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. answer :MIME

3.1.TCP provides __________between application processes running on different ho sts answer :Logical communications 3.2.What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver 3.3.In the transport layer, the job of gathering data at the source host from di fferent application processes, enveloping the data with header information to cr eate segments, and passing the segments to the network layer is called _______. answer :Multiplexing 3.4.In the ________ algorithm of the TCP congestion control, the size of the con gestion window increases exponentially until timeout answer :Slow start 3.5.If the segment has sequence number of 128 and length of 8 bytes, the receivi ng computer will send ACK with value of _________ answer :136 3.6.Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not 3.7.What flag is used to close TCP connection? answer :FIN 3.8.The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel 3.9.TCP is a ___________ protocol. answer :Connection-oriented 3.10.TCP assigns a sequence number to each segment that is being sent. The seque nce number for each segment is the number of the _______ byte carried in that se gment. answer :First 4.1.What is the data unit used in Internet Protocol (IP)? answer :Datagram 4.2.DHCP is used by the server to: answer :Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed?

answer :32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? answer :All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) answer :2 4.6.Traceroute command uses answer :ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm 4.8.Routers operate in the _______ layers. answer :network 4.9.Dijkstra s algorithm is answer :A link-state routing algorithm 4.10.Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder answer :0000 5.2.______ is (are) (an) example(s) of random access MAC answer :All of them 5.3.In cyclic redundancy checking, what is CRC answer :the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN 5.5.What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet answer :CSMA/CD 5.7.Which one is the flag used for framing in PPP? answer :01111110 5.8.Which one can be a MAC address? answer :00-D0-56-F2-B5-12 5.9.ARP stands for __________ answer :Address Resolution Protocol 5.10.Parity checking _____. answer :can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer answer :802.11 2 UDP offers which of the following benefits relative to TCP answer :UDP consumes fewer computer resources by not maintaining connection stat

e 3 What is the purpose of LCP packets answer :All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer answer :Session Layer 5 Which of the following is a Man answer :WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? answer :2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called answer :Cell 8 Which of the following protocols provides the security for HTTPS answer :SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network answer :Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er answer :It is used for reordering of the octets received 11 Which of the following is not function of the data link layer answer :Data rate control 12 Which of following term does NOT belong the ToS field of IP Header answer :Priority 13 In Ethernet frame, the maximum size of the Pad field is answer :64 byte 14 Flow control is needed to prevent answer :overflow of the sender buffer 15 Which of the following is a valid IPv6 address answer :2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase answer :?Quantization 17. in the resource records os DNS, which record is also know as an alias record answer :?CNAME record. 18. A bridge can increase network effeciency by: answer :?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? answer :? BNCs 20. Which of the following are characteristic of a peer-to-peer network? answer :? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can

answer :? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: answer :?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. answer :? Replace repeater with hubs. 24. which of the following has the highest possible throughput? answer :? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? answer :?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state answer :? establish 27. Find the minimum hamming distance for the correction of two errors answer :? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m answer :? half-duplex. 29. what is a router? answer : a piece of hardware or software that forwards packet sbase on ip addres s. 30. OSPF multicasts are sent out as what class of address? answer :Class A 31.what is another name for a packet-switching network? answer : store and forward. 32. updates for a satellite s coordinates can be optained on the www. answer :Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? answer : Multipart / mixed 34. Port 110(POP) is what kind of port? answer : Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? answer :A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state answer : FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. answer :b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP answer :It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. answer :c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute answer :Hop count 42 The PING and the TRACEROUTE utilities uses protocol answer :ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data answer :Transport layer 44 Which of the following statements regarding protocol stacks are FALSE answer :A given protocol stack can run only one computer type

In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network answer :Virtual-circuit network / Datagram network Which statement is correct for layering in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. answer :TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is answer :Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ answer :Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is answer :L/R Which one is correct about P2P network? answer :A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. answer :TCP _____ provides reliable, in-order transfer of bytes between client and server answer :TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? answer :All of the other SMTP stands for answer :Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 IMAP and POP are_________ answer :Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. answer :MIME TCP provides __________between application processes running on different hosts answer :Logical communications What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. answer :Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest

ion window increases exponentially until timeout answer :Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ answer :136 Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? answer :FIN The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel TCP is a ___________ protocol. answer :Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . answer :First What is the data unit used in Internet Protocol (IP)? answer :Datagram DHCP(dynamic host configuration protocol) is used by the server to: answer :Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? answer :32 subnets and 8 hosts Why NAT (Network Address Translation) is used? answer :All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) answer :2 Traceroute command uses answer :ICMP RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm Routers operate in the _______ layers. answer :network Dijkstra s algorithm is answer :A link-state routing algorithm Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder answer :0000 ______ is (are) (an) example(s) of random access MAC answer :All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) answer :the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station ______is used in Ethernet answer :CSMA/CD Which one is the flag used for framing in PPP

answer :01111110 Which one can be a MAC address? answer :00-D0-56-F2-B5-12 ARP stands for _________ answer :Address Resolution Protocol Parity checking _____. answer :can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. answer : (c): Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer : (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer : (b): Mesh 4. Which topology requires a central controller or hub? answer : (a): Star 5. The _______ is the physical path over which a message travels. answer : (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer : (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer : (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer : (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer : (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer : (c): Security 11. Which topology requires a multipoint connection? answer : (d): Bus 12. A television broadcast is an example of _______ transmission. answer :(c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer : (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer : (d): Bus Chapter 2: Network Models

15. The _______ layer changes bits into electromagnetic signals. answer : (a): Physical 16. The physical layer is concerned with the transmission of _______ over the ph ysical medium. answer :c. Bits 17. Mail services are available to network users through the _______ layer. answer :c. Application 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. answer :d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. answer :b. Added 20. The _______ layer lies between the network layer and the application layer. answer :c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. answer :b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. answer :c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? answer :b. Transport layer 24. What is the main function of the transport layer? answer :a. Process-to-process delivery 25. Which of the following is an application layer service? answer :d. All the above 26. The Internet model consists of _______ layers. answer :b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. answer :c. Transport 28. The _______ layer is the layer closest to the transmission medium. answer :b. Physical Chapter 3: Signals 29. Before data can be transmitted, they must be transformed to ________. answer :a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. answer :b. Is greater than zero 31. A periodic signal can always be decomposed into ________.

answer :c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? answer :c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. answer :a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. answer :c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. answer :b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? answer :d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? answer :a. 3.96 MHz 39. As frequency increases, the period ________. answer :a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. answer :c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. answer :c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. answer :a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? answer :c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? answer :b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. answer :b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. answer :b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. answer :b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. answer :a. The signal is equal to the noise

49. A sine wave is ________. answer :d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. answer :c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. answer :b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. answer :d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. answer :c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. answer :b. Noise 55. The ________ has units of meters/second or kilometers/second. answer :c. Propagation speed 56. ________ has units of bits/second. answer :a. Throughput 57. The ________ has units of seconds. answer :b. Propagation time 58. The wavelength of a signal depends on the ________. a. Frequencies of the signal answer :b. Medium Chapter 4: Encoding and Modulation 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? answer :b. BnZS 60. Block coding can help in _______ at the receiver. answer :a. Synchronization / b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. answer :a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. answer :b. Line 63. _______ encoding has a transition at the middle of each bit. answer :d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit.

answer :a. Differential Manchester 65. PCM is an example of _______ conversion. answer :b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? answer :d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. answer :a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. answer :c. Variable 69. Synchronous transmission does not have _______. answer :d. All the above 70. Which encoding type always has a nonzero average amplitude? answer :c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? answer :b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? answer :b. AMI 73. In PCM, an analog-to- _______ conversion occurs. answer :b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? answer :c. 6 75. RZ encoding involves _______ signal levels. answer :c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? answer :d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. answer :a. Asynchronous serial / b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. answer :b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels. answer :c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. answer :b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. answer :b. Less than or equal to

Chapter 5: Multiplexing 82. AM and FM are examples of ________ modulation. answer :a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. answer :c. Amplitude 84. Which of the following is most affected by noise? answer :d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. answer :d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. answer :b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________. answer :d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. answer :c. Increases 89. In 16-QAM, there are 16 ________. answer :b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? answer :d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. answer :d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? answer :c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? answer :d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? answer :c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? answer :b. 700 KHz 96. A modulated signal is formed by ________. answer :a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. answer :b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. answer :a. 50

99. When an ASK signal is decomposed, the result is ________. answer :a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. answer :d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. answer :d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. answer :b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. answer :a. Less than 104. What is the object of trellis coding? answer :c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. answer :a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. answer :a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. answer :c. Increases 108. The bit rate always equals the baud rate in which type of signal? answer :a. FSK 109. Which ITU-T modem standard uses trellis coding? answer :a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. answer :a. Less than Chapter 6: Switching 111. Which multiplexing technique transmits digital signals? answer :c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? answer :b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. answer :b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. answer :b. Greater than

115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. answer :b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. answer :c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. answer :b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. answer :b. FDM 119. Which multiplexing technique transmits analog signals? answer :a. FDM / c. WDM 120. In a T-1 line, _______ interleaving occurs. answer :b. Byte 121. Which multiplexing technique involves signals composed of light beams? answer :a. WDM Chapter 7: Transmission Media 122. The VLF and LF bands use _______ propagation for communications. answer :b. Ground 123. Category 1 UTP cable is most often used in _______ networks. answer :b. Telephone 124. BNC connectors are used by _______ cables. answer :d. Coaxial 125. Which of the following is not a guided medium? answer :c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. answer :d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. answer :a. Coaxial 128. In fiber optics, the signal source is _______ waves. answer :b. Light 129. Smoke signals are an example of communication through _______. answer :c. An unguided medium 130. Which of the following primarily uses guided media? answer :c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? answer :a. Outer conductor 132. The RG number gives us information about _______.

answer :c. Coaxial cables 133. Transmission media are usually categorized as _______. answer :a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. answer :b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. answer :b. Denser than 136. The inner core of an optical fiber is _______ in composition. answer :c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. answer :b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. answer :a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. answer :b. Multimode step-index 140. In _______ propagation, the core is of varying densities. answer :c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. answer :c. The air 142. Transmission media are closest to the _______ layer. answer :b. Physical 143. Radio wave and microwave frequencies range from _______. answer :c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. answer :d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. answer :b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. answer :c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. answer :d. Unidirectional Chapter 8 : Telephone, Cable, and Satellite Networks 148. The telephone service handled between two LATAs is called _______. answer :b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? answer :a. 2000 150. The _______ is a device that connects n inputs to m outputs.

answer :a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. answer :c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? answer :b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. answer :d. Control unit 154. Which of the following is a time-division switch? answer :a. TSI / b. TDM bus 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. answer :a. Control unit 156. A telephone network is an example of a _______ network. answer :a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. answer :c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. answer :d. (b) and (c) 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. answer :d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. answer :c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. answer :a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. answer :b. Digital; analog 163. To create a _______, combine crossbar switches in stages. answer :b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. answer :b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. answer :b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. answer :c. Filters

167. The actual bit rate of ADSL downstream data is _______. answer :c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. answer :c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. answer :a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . answer :d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. answer :d. CMTS 172. HDSL encodes data using _______. answer :c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. answer :a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. answer :c. Head end 175. A traditional cable TV network transmits signals ______. answer :c. Downstream 176. _______ was designed as an alternative to the T-1 line. answer :c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. answer :b. User data / c. Overhead 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. answer :a. VDSL / b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . answer :c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. answer :a. Modulation / b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. answer :b. 6 182. _______ data go from the subscriber to the Internet. answer :b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. answer :b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow

nstream data rates. answer :a. SDSL 185. SONET is an acronym for _______ Network. answer :c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. answer :b. Downstream data 187. In a SONET system, _______ can remove signals from a path. answer :a. An add/drop multiplexer Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? answer :c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? answer :b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? answer :c. Simple parity check 191. Which error detection method involves polynomials? answer :a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? answer :c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? answer :c. Single-bit 194. In cyclic redundancy checking, what is the CRC? answer :a. The remainder 195. Which error detection method involves the use of parity bits? answer :a. Simple parity check / b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. answer :b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? answer :c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? answer :c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? answer :b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. answer :d. Odd

201. In CRC there is no error if the remainder at the receiver is _______. answer :d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. answer :c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. answer :a. -0 204. In CRC the quotient at the sender _______. answer :d. Is discarded 205. The Hamming code is a method of _______. answer :a. Error detection / b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. answer :b. A nonzero remainder 207. Which error detection method can detect a single-bit error? answer :d. All the above 208. Which error detection method can detect a burst error? answer :a. The parity check / b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. answer :c. 0s are Chapter 11 : Wired Local Area Networks 210. HDLC is an acronym for _______. answer :c. High-level data link control 211. Flow control is needed to prevent ________. answer :b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? answer :c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. answer :b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. answer :c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. answer :a. Go-Back-N 216. ARQ stands for _______. answer :a. Automatic repeat request 217. In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the rece iver may send an ACK _______ to the sender. answer :d. Any of the above

218. The shortest frame in HDLC protocol is usually the _______ frame. answer :c. Supervisory 219. The address field of a frame in HDLC protocol contains the address of the _ ______ station. answer :b. Secondary 220. The HDLC _______ field defines the beginning and end of a frame. answer :c. Flag 221. A timer is set when _______ is (are) sent out. answer :c. A data frame 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. answer :c. n 223. What is present in all HDLC control fields? answer :d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. answer :c. Establishing 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. answer :d. Authenticating 226. PAP requires _______ and _______ from the user. answer :c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. answer :b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. answer :d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. answer :a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. answer :b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. answer :d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. answer :b. Address 233. What is the purpose of LCP packets? answer :d. All the above

234. _______ is a three-way handshake for user verification. answer :b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. answer :d. Control 236. In the PPP frame, the _______ field is for error control. answer :a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. answer :c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. answer :c. 8 239. In the _______ random-access method there is no collision. answer :b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . answer :a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. answer :c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . answer :d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. answer :d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. answer :a. 1.0 245. _______ is a random-access protocol. answer :c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. answer :a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. answer :a. 16 248. _______ is a controlled-access protocol. answer :d. Reservation 249. _______ is (are) a channelization protocol. answer :d. All the above 250. _______ is the access protocol used by traditional Ethernet. answer :c. CSMA/CD 251. The most primitive random access method is _______.

answer :b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. answer :c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. answer :b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. answer :b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. answer :a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. answer :a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. answer :b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? answer :a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? answer :b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? answer :b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? answer :d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? answer :a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. answer :d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. answer :d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. answer :a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. answer :c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? answer :b. 70 percent

268. Which of the following could not be an Ethernet multicast destination? answer :b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? answer :c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? answer :b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. answer :c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. answer :a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. answer :d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. answer :b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. answer :b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. answer :d. 2.5 277. In an ESS the _______ station is not mobile. answer :b. AP 278. In an ESS the _______ stations are part of a wired LAN. answer :b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. answer :a. No-transition 280. _______ combine to form a scatternet. answer :b. Piconets 281. Bluetooth uses _______ in the physical layer. answer :c. FHSS 282. A _______ frame usually precedes a CTS frame. answer :b. RTS 283. A station with _______ mobility can move from one BSS to another. answer :c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. answer :b. ESS-transition

285. A _______ frame usually precedes an RTS frame. answer :d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. answer :b. More 287. Which MAC sublayer does IEEE 802.11 define? answer :b. PCF / c. DCF 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? answer :c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. answer :d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. answer :c. Physical 291. Stations do not sense the medium during _______ time. answer :b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. answer :c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. answer :b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. answer :c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. answer :c. Management 296. A Bluetooth network can have _______ master(s). answer :a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. answer :b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). answer :b. Physical (MAC) 299. A _______ is actually a multiport repeater. answer :a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. answer :d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . answer :c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge.

answer :b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. answer :c. Loops 304. Bridges function in the _______ layer(s). answer :a. Physical (MAC) / b. Data link 305. In a VLAN, stations are separated into groups by _______. answer :a. Software methods 306. A bridge can _______. answer :d. Do all the above 307. A _______ bridge has the smallest ID. answer :d. Root 308. A bridge never forwards frames out of the _______ port. answer :c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? answer :a. Transparent 310. VLAN technology divides a LAN into ______ groups. answer :d. Logical 311. Which of the following is a connecting device? answer :d. All the above 312. Which station characteristic can be used to group stations into a VLAN? answer :d. All the above 313. _______ is a first-generation cellular phone system. answer :c. AMPS 314. AMPS uses _______ for modulation. answer :a. FM / b. FSK 315. _______ separates the AMPS voice channels. answer :c. FDMA 316. _______ is a cellular telephone system popular in Europe. answer :a. GSM 317. D-AMPS uses _______ for multiplexing. answer :b. TDMA / c. FDMA 318. GSM uses _______ for multiplexing. answer :b. TDMA / c. FDMA 319. DSSS is used by the _______ cellular phone system. answer :b. IS-95 320. _______ base stations use GPS for synchronization. answer :b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. answer :a. Teledesic

322. IS-95 has a frequency reuse factor of _______. answer :c. 1 323. The path that a satellite makes around the world is called _______. answer :a. An orbit 324. A GEO satellite has _______ orbit. answer :d. An equatorial 325. Which orbit has the highest altitude? answer :b. GEO 326. _______ is a second-generation cellular phone system. answer :d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. answer :d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. answer :c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. answer :c. Footprint 330. In _______, a mobile station always communicates with just one base station . answer :c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. answer :d. Between the 332. _______ is often used for navigation purposes. answer :a. GPS 333. An LEO satellite has _______ orbit. answer :b. A polar 334. Teledesic is a _______ LEO satellite system. answer :b. Broadband 335. _______ has 66 satellites in six LEOs. answer :d. Iridium 336. Transmission from the Earth to the satellite is called the _______. answer :b. Uplink 337. The _______ is not used for voice communication. answer :a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. answer :c. VOFR 339. Frame Relay provides _______ connections. answer :a. PVC / b. SVC 340. Routing and switching in Frame Relay are performed by the _______ layer. answer :c. Data link

341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. answer :b. Real-time video 342. The Frame Relay address field is _______ in length. answer :d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. answer :b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. answer :c. LMI 345. Frame Relay operates in the _______. answer :a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. answer :a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. answer :c. 12 348. In data communications, ATM is an acronym for _______. answer :c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? answer :d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? answer :b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? answer :a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? answer :a. AAL1 353. The VPI of a UNI is _______ bits in length. answer :d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. answer :a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. answer :a. FRAD 356. A _______ provides a connection or a set of connections between switches. answer :b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. answer :b. Transmission path 358. On a network that uses NAT, the _______ has a translation table.

answer :a. Router 359. Identify the class of IP address 229.1.2.3. answer :d. Class D 360. On a network that uses NAT, _______ initiates the communication. answer :a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. answer :b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. answer :a. Twenty-five 363. Identify the class of IP address 4.5.6.7. answer :a. Class A 364. Identify the class of IP address 191.1.2.3. answer :b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. answer :a. Nine 366. Class _______ has the greatest number of hosts per given network address. answer :a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? answer :b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. answer :b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? answer :b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? answer :c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? answer :d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. answer :b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. answer :b. The datagram approach to packet switching 374. An IP address consists of _______ bits. answer :b. 32 375. On a network that uses NAT, the router can use _______ global address(es). answer :a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in

the routing table. answer :a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? answer :a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? answer :a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. answer :a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer :a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. answer :c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. answer :c. Time-exceeded 383. An ARP request is _______ to _______. answer :c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? answer :a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. answer :d. All the above 386. An HLEN value of decimal 10 means _______. answer :b. There is 40 bytes in the header 387. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? answer :c. 428 388. If the fragment offset has a value of 100, it means that _______. answer :a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? answer :b. Offset number / c. Total length 390. The IP header size _______. answer :b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. answer :b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? answer :a. Base header / c. Data packet from the upper layer 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. answer :c. ARP

394. A router reads the _______ address on a packet to determine the next hop. answer :c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. answer :c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. answer :a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. answer :c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? answer :d. All the above 399. The purpose of echo request and echo reply is to _______. answer :c. Check node-to-node communication 400. An ARP reply is _______ to _______. answer :a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. answer :a. Source-quench 402. A time-exceeded message is generated if _______. answer :b. The time-to-live field has a zero value / c. Fragments of a message d o not arrive within a set time 403. To determine whether a node is reachable, _______ message can be sent. answer :a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. answer :b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? answer :a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer :b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. answer :b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. answer :b. 0 409. A routing table contains _______. answer :d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i

n B's routing table for Net1? Assume the basic RIP is being used. answer :a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? answer :c. 1 412. An area border router can be connected to _______. answer :d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? answer :b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. answer :d. PIM-DM; PIM-SM 415. When a multicast router is not directly connected to another multicast rout er, a _______ can be formed to connect the two. answer :d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? answer :a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. answer :b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in answer :b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. answer :c. Broadcast 420. Which type of BGP message announces a route to a new destination? answer :a. Update 421. Which layer produces the OSPF message? answer :d. Network 422. Which of the following is an exterior routing protocol? answer :c. BGP 423. An area is _______. answer :c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? answer :c. n 1 425. Which of the following is an interior routing protocol? answer :a. RIP / b. OSPF 426. OSPF is based on _______. answer :c. Link state routing

427. BGP is based on _______. answer :c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? answer :b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? answer :c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? answer :a. Virtual 431. Which type of BGP message is sent by a router to close a connection? answer :c. Notification 432. An IGMP query is sent from a _______ to a _______. answer :a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? answer :a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. answer :c. Transient 435. In distance vector routing each router receives information directly from _ ______. answer :a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. answer :c. 5 437. _______ is a multicast routing protocol using source-based trees. answer :a. DVRMP / b. MOSPF 438. Pruning and grafting are strategies used in _______. answer :a. RPM 439. In distance vector routing a router sends out information _______. answer :c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. answer :c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. answer :a. Version / b. Type 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. answer :a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. answer :a. Unicast 444. ________ is a multicasting application.

answer :d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. answer :c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. answer :d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. answer :b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. answer :a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. answer :c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. answer :c. RPB 451. Dijkstra's algorithm is used to _______. answer :d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. answer :b. Prune 453. The _______ is used by a router in response to a received-leave report. answer :a. Special query message 454. RIP is based on _______. answer :d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. answer :d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. answer :d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. answer :b. CBT 458. The _______ is an IGMP message. answer :d. All the above 459. The _______ defines the client program. answer :b. Ephemeral port number 460. The _______ timer is used in the termination phase. answer :b. Time-waited 461. Which is a legal port address? answer :d. All the above

462. The definition of reliable delivery includes _______. answer :d. All the above 463. Which of the following does UDP guarantee? answer :d. None of the above 464. The source port address on the UDP user datagram header defines _______. answer :d. The application program on the sending computer 465. A host can be identified by _______ while a program running on the host can be identified by _______. answer :b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? answer :c. Length of header 467. The _______ defines the server program. answer :b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. answer :b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. answer :a. Persistence 470. Connection establishment involves a _______ handshake. answer :a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. answer :a. Persistence 472. The _______ address uniquely identifies a running application program. answer :c. Socket 473. The _______ field is used to order packets of a message. answer :a. Sequence number 474. The _______ field is used for error detection. answer :d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. answer :a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. answer :b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. answer :a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. answer :b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data

at a very slow rate, _______ can be used. answer :a. Clark's solution / c. Delayed acknowledgment 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. answer :a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. answer :d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. answer :a. Keep-alive 483. UDP and TCP are both _______ layer protocols. answer :d. Transport 484. Which of the following functions does UDP perform? answer :b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. answer :d. Port 486. Karn's algorithm is used in calculations by the _______ timer. answer :b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. answer :c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. answer :c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. answer :a. Receiver / c. Congestion 490. _______ traffic features sudden data rate changes in very short periods of time. answer :b. Bursty 491. When the load is greater than the capacity, the delay _______. answer :b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. answer :d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. answer :d. Destination; sender 494. The _______ is the maximum data rate of the traffic. answer :d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. answer :b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out

of the queue. answer :c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. answer :b. The access rate 498. _______ measures the variation in cell transmission time. answer :b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? answer :c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. a. Leaky bucket b. Traffic bucket answer :c. Token bucket d. Bursty bucket The correct is c 501. A flow-based QoS model designed for IP is called _______. a. RSVP answer :b. Integrated Services c. Differentiated Services d. Multicast trees The correct is b 502. A signaling protocol that helps IP create a flow is called _______. answer :a. RSVP b. Integrated Services c. Differentiated Services d. Multicast trees The correct is a 503. RSVP uses _______ messages. a. Path b. Resv c. Resource answer :d. (a) and (b) The correct is d 504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. a. Fixed answer :b. Shared explicit c. Wild card d. All the above The correct is b 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. a. Stability b. Reservation answer :c. Scalability d. All the above The correct is c 506. A _______ is a Differentiated Services traffic conditioner. a. Meter b. Marker

answer :c. Shaper The correct is c 507. What is the relationship between the access rate and the CIR? a. CIR plus Be is equal to the access rate. b. CIR is always equal to the access rate. c. CIR is greater than the access rate. answer :d. CIR is less than the access rate. The correct is d 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. answer :a. CDV b. CLR c. CTD d. CER The correct is a 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. a. Be answer :b. Bc c. CIR d. (a) and (b) The correct is b 510. The effective bandwidth is based on _______. a. Average data rate b. Peak data rate c. Maximum burst size answer :d. All the above The correct is d 511. The cell _______ is the difference between the CTD maximum and minimum. answer :a. Delay variation b. Error ratio c. Loss ratio d. Transfer delay The correct is a 512. The cell _______ is the ratio of lost cells to cells sent. a. Delay variation b. Error ratio answer :c. Loss ratio d. Transfer delay The correct is c 513. The _______ service class is particularly suitable for applications with bu rsty data. a. CBR answer :b. ABR c. VBR d. UBR The correct is b 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. a. ABR answer :b. CBR c. VBR d. UBR

The correct is b 515. The _______ is greater than the SCR. a. MCR b. CVDT answer :c. PCR d. All the above The correct is c 516. The _______ is the fraction of the cells delivered in error. a. CLR answer :b. CER c. CTD d. CDV The correct is b 517. When added to Be, Bc should be less than the _______. a. CIR b. Committed burst size answer :c. Access rate d. (a) and (b) The correct is c 518. A connectionless iterative server uses _______ ports. answer :a. Well-known b. Ephemeral c. Active d. (a) and (b) The correct is a 519. The _______ socket is used with a protocol that directly uses the services of IP. answer :a. Raw b. Stream c. Datagram d. Remote The correct is a 520. A _______ server serves multiple clients, handling one request at a time. answer :a. Connectionless iterative b. Connectionless concurrent c. Connection-oriented iterative d. Connection-oriented concurrent The correct is a 521. A client issues _______ when it needs service from a server. a. An active request b. A finite open answer :c. An active open d. A passive open The correct is c 522. A _______ server serves multiple clients simultaneously. a. Connectionless iterative b. Connectionless concurrent c. Connection-oriented iterative answer :d. Connection-oriented concurrent The correct is d 523. The server program is _______ because it is always available, waiting for a

client request. a. Finite answer :b. Infinite c. Active d. Passive The correct is b 524. A connection-oriented concurrent server uses _______ ports. a. Well-known b. Ephemeral c. Active answer :d. (a) and (b) The correct is d 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? a. One b. Two c. Three answer :d. Four The correct is d 526. A server program, once it issues _______, waits for clients to request its service. a. An active request b. A finite open c. An active open d. A passive open answer :The correct is d 527. _______ can request a service. a. A socket interface answer :b. A client c. A port d. A server The correct is b 528. _______ can provide a service. a. An iterative server b. A concurrent server c. A client d. (a) and (b) answer :The correct is d 529. The client program is _______ because it terminates after it has been serve d. answer :a. Finite b. Infinite c. Active d. Passive The correct is a 530. _______ processes requests one at a time. answer :a. An iterative server b. A concurrent client c. An iterative client d. A concurrent server The correct is a 531. The _______ socket is used with a connectionless protocol.

a. Raw b. Stream answer :c. Datagram d. Remote The correct is c 532. _______ processes many requests simultaneously. a. An iterative server b. A concurrent client c. An iterative client answer :d. A concurrent server The correct is d 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. answer :a. Well-known port b. Infinite port c. Ephemeral port d. (b) and (c) The correct is a 534. A _______ is an instance of a _______. a. Program; process answer :b. Process; program c. Process; service d. Structure; process The correct is b 535. The _______ socket is used with a connection-oriented protocol. a. Raw answer :b. Stream c. Datagram d. Remote The correct is b 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? a. 107.123.46.0 answer :b. 107.0.0.0 c. 219.46.123.0 d. 107.123.0.0 The correct is b 537. In _______ resolution the client is in direct contact with at most one serv er. a. A cache answer :b. A recursive c. An iterative d. All the above The correct is b 538. In address-to-name resolution the _______ domain is used. a. Reverse b. Generic c. Country answer :d. Inverse The correct is d 539. How is the lifetime of a name-to-address resolution in cache memory control led?

a. By the time-to-live field set by the server b. By the time-to-live counter set by the server c. By the time-to-live field set by the authoritative server answer :d. (b) and (c) The correct is d 540. A DNS response is classified as ______ if the information comes from a cach e memory. a. Authoritative b. Recursive answer :c. Unauthoritative d. Iterative The correct is c 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) a. Fourth answer :b. Fifth c. Third d. Not enough information given The correct is b 542. A DNS _______ server's zone is the entire DNS tree. a. Secondary answer :b. Root c. Primary d. All the above The correct is b 543. To find the IP address of a host when the domain name is known, the _______ can be used. answer :a. Inverse domain b. Generic domains c. Country domains d. (b) or (c) The correct is a 544. A DNS _______ server gets its data from another DNS server. a. Root b. Primary answer :c. Secondary d. All the above The correct is c 545. A DNS _______ server creates, maintains, and updates the zone file. a. Root answer :b. Primary c. Secondary d. All the above The correct is b 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) a. Fourth b. Fifth c. Third answer :d. Not enough information given The correct is d 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label.

a. fhda answer :b. edu c. chal d. atc The correct is b 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. a. Fhda answer :b. chal c. atc d. edu The correct is b 549. In _______ resolution the client could directly contact more than one serve r. answer :a. An iterative b. A cache c. A recursive d. All the above The correct is a 550. Which of the following domain names would most likely use a country domain to resolve its IP address? a. chal.atac.fhda.edu answer :b. kenz.acct.sony.jp c. gsfc.nasa.gov d. mac.eng.sony.com The correct is b 551. A resolver is the _______. a. Host machine answer :b. DNS client c. DNS server d. Root server The correct is b 552. Which of the following is true? a. FTP allows systems with different directory structures to transfer files. b. FTP allows a system using ASCII and a system using EBCDIC to transfer files. c. FTP allows a PC and a SUN workstation to transfer files. answer :d. All the above are true. The correct is d 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? a. Multipart/parallel b. Multipart/digest c. Multipart/alternative answer :d. Multipart/mixed The correct is d 554. During an FTP session the control connection is opened _______. a. As many times as necessary answer :b. Exactly once c. Exactly twice d. All the above The correct is b 555. The purpose of the MTA is _______. answer :a. Transferral of messages across the Internet b. Message preparation

c. Envelope creation d. (a) and (b) The correct is a 556. In anonymous FTP, the user can usually _______. a. Store files answer :b. Retrieve files c. Navigate through directories d. Do all the above The correct is b 557. Which part of the mail created by the UA contains the sender and receiver n ames? answer :a. Header b. Body c. Envelope d. Address The correct is a 559. The _______ field in the MIME header uses text to describe the data in the body of the message. a. Content-transfer-encoding answer :b. Content-Id c. Content-type d. Content-description The correct is b 560. The _______ field in the MIME header describes the method used to encode th e data. a. Content-Id b. Content-description c. Content-type answer :d. Content-transfer-encoding The correct is d 561. The _______ field in the MIME header has type and subtype subfields. a. Content-transfer-encoding answer :b. Content-type c. Content-Id d. Content-description The correct is b 562. A JPEG image is sent as email. What is the content-type? a. Multipart/mixed b. Multipart/image c. Image/basic answer :d. Image/JPEG The correct is d 563. The purpose of the UA is _______. a. Message preparation b. Envelope creation c. Transferral of messages across the Internet answer :d. (a) and (b) The correct is d 564. The _______ field in the MIME header is the type of data and the body of th e message. a. Content-Id

b. Content-description answer :c. Content-type d. Content-transfer-encoding The correct is c 565. A message is fragmented into three email messages. What is the content-type ? answer :a. Message/partial b. Multipart/partial c. Multipart/mixed d. Message/RFC822 The correct is a 566. A client machine usually needs _______ to send email. a. Only POP b. Both SMTP and POP answer :c. Only SMTP d. None of the above The correct is c 567. In FTP, what attributes must be defined by the client prior to transmission ? a. Data type b. File structure c. Transmission mode answer :d. All the above The correct is d 568. In FTP, there are three types of _______: stream, block, and compressed. a. Data structures answer :b. Transmission modes c. Files d. All the above The correct is b 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. a. Data structure b. Transmission mode answer :c. File type d. All the above The correct is c 570. In FTP, when you _______, it is copied from the server to the client. a. Retrieve a file b. Store a file c. Retrieve a list answer :d. (a) and (c) The correct is d 571. In FTP, when you _______, it is copied from the client to the server. a. Retrieve a file answer :b. Store a file c. Retrieve a list d. (a) and (c) The correct is b 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? a. Multipart/digest b. Multipart/alternative

c. Multipart/mixed answer :d. Multipart/parallel The correct is d 573. During an FTP session the data connection is opened _______. a. Exactly once b. Exactly twice answer :c. As many times as necessary d. All the above The correct is c 574. Which of the following is a retrieval method? a. HTTP b. FTP c. TELNET answer :d. All the above The correct is d 575. A request message always contains _______. a. A status line, a header, and a body b. A status line and a header c. A header and a body answer :d. A request line and a header The correct is d 576. Which of the following is present in both a request line and a status line? a. URL b. Status code answer :c. HTTP version number d. Status phrase The correct is c 577. Which of the following is not a client program in WWW? a. FTP b. HTTP answer :c. HTML d. TELNET The correct is c 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. answer :a. PUT b. GET c. POST d. COPY The correct is a 579. The _______ header can specify the client configuration and the client's pr eferred document format. answer :a. Request b. Response c. General d. Entity The correct is a 580. The _______ tags enclose binary code or byte code. answer :a. Executable contents b. Image c. List d. Hyperlink

The correct is a 581. Which type of Web document is run at the client site? a. Dynamic answer :b. Active c. Static d. All the above The correct is b 582. HTTP has similarities to both _______ and _______. a. FTP; MTV b. FTP; URL c. FTP; SNMP answer :d. FTP; SMTP The correct is d 583. A user needs to send the server some information. The request line method i s ______. a. OPTION answer :b. POST c. PATCH d. MOVE The correct is b 584. A response message always contains _______. a. A header and a body b. A status line, a header, and a body answer :c. A request line and a header d. A status line and a header The correct is c 585. The _______ header supplies information about the body of a document. a. General b. Request answer :c. Entity d. Response The correct is c 586. The _______ header can specify the server configuration or provide informat ion about a request. a. General b. Request answer :c. Response d. Entity The correct is c 587. Hypertext documents are linked through _______. a. TELNET answer :b. Pointers c. DNS d. Homepages The correct is b 588. Which of the following is an interpreter? a. CGI b. FTP c. HTTP answer :d. HTML The correct is d

589. What are the components of a browser? answer :a. Controller, client program, interpreter b. Retrieval method, host computer, path name c. Hypertext, hypermedia, HTML d. All the above The correct is a 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. answer :a. GET b. HEAD c. POST d. PUT The correct is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? a. Dynamic b. Active answer :c. Static d. All the above The correct is c 592. The _______ of a Web page contains the title and parameters used by the bro wser. a. Attributes b. Tags answer :c. Head d. Body The correct is c 593. Which type of Web document is created at the server site only when requeste d by a client? a. Active b. Static answer :c. Dynamic d. All the above The correct is c 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. a. The head b. The body c. A tag answer :d. An attribute The correct is d 595. A user wants to copy a file to another location; the request line contains the _______ method. a. PUT b. PATCH answer :c. COPY d. POST The correct is c 596. What does the URL need to access a document? a. Path name b. Host computer c. Retrieval method answer :d. All the above The correct is d

597. Which type of Web document is transported from the server to the client in binary form? answer :a. Active b. Static c. Dynamic d. All the above The correct is a 598. An ending tag is usually of the form _______ a. <tagname> b. <tagname!> answer :c. </tagname> The correct is c 599. An applet is a small application program written in _______ a. Shell script answer :b. Java c. C d. C++ The correct is b 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. a. Passive answer :b. Dynamic c. Active d. Static The correct is b 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. a. Passive answer :b. Dynamic c. Active d. Static The correct is b 602. A user needs to move a file to another location. The request line method is _______. a. PATCH answer :b. MOVE c. PUT d. GET The correct is b 603. Which category of HTML tags allows the listing of documents? a. Image b. Hyperlink answer :c. List d. Executable contents The correct is c 604. A program can use _______ to write a CGI program. a. Bourne shell script b. Perl c. C answer :d. Any of the above The correct is d

605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. a. Passive b. Dynamic c. Active answer :d. Static The correct is d 606. The server receives input from a browser through _______. a. An attribute answer :b. A form c. A tag d. Any of the above The correct is b 607. Output from a CGI program is _______. a. Text b. Graphics c. Binary data answer :d. Any of the above The correct is d 608. _______ is used to enable the use of active documents. a. CGI b. Java answer :c. HTML d. All the above The correct is c 609. Java is _______. a. A programming language b. A run-time environment c. A class library answer :d. All the above The correct is d 610. An applet is _______ document application program. answer :a. An active b. A passive c. A static d. A dynamic The correct is a 611. In a real-time video conference, data from the server are _______ to the cl ient sites. a. Unicast b. Broadcast answer :c. Multicast d. None of the above The correct is c 612. A _______ adds signals from different sources to create a single signal. answer :a. Mixer b. Translator c. Timestamp d. Sequence number The correct is a 613. The RTCP _______ message shuts down a stream. a. Application-specific

b. Source description answer :c. Bye d. Farewell The correct is c 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. a. SIP answer :b. H.323 c. IEEE 802.3 d. V.90bis The correct is b 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. a. Timestamp b. Sequence number c. Mixer answer :d. Translator The correct is d 616. An RTP packet is encapsulated in a(n) _______. a. IP datagram b. RTCP packet answer :c. UDP user datagram d. TCP segment The correct is c 617. The last step in JPEG, _______, removes redundancies. a. Blocking answer :b. Compression c. Quantization d. Vectorization The correct is b 618. A _______ shows when a packet was produced relative to the first or previou s packet. a. Sequence number b. Threshold answer :c. Timestamp d. Playback buffer The correct is c 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). a. H.245 b. H.225 c. H.323 answer :d. Q.931 The correct is d 620. TCP is not suitable for real-time traffic because _______. a. There is no provision for timestamping b. There is no support for multicasting c. Missing packets are retransmitted answer :d. All the above The correct is d 621. JPEG encoding involves _______, a process that reveals the redundancies in a block.

a. Quantization b. Vectorization c. Blocking answer :d. The DCT The correct is d 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. a. Sender b. QoS answer :c. Receiver d. Passive The correct is c 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. a. DCT answer :b. SIP c. RTCP d. JPEG The correct is b 624. For streaming stored audio/video, the _______ holds information about the a udio video file. a. Jitter b. Alpha file c. Beta file answer :d. Metafile The correct is d 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. a. TCP/IP answer :b. RTSP c. HTTP d. SIP The correct is b 626. The audio/video stream is sent by the media server to the _______. answer :a. Media player b. Browser c. Web server d. None of the above The correct is a 627. Voice over IP is a(n) ________ audio/video application. answer :a. Interactive b. Streaming stored c. Streaming live d. None of the above The correct is a 628. _______ is a SIP message type. a. INVITE b. CANCEL c. OPTIONS answer :d. All the above The correct is d 629. A _______ is involved in an SIP mechanism to find the IP address of a calle

e. a. Proxy server b. Registrar server c. Media server answer :d. (a) and (b) The correct is d 630. _______ are used to number the packets of a real-time transmission. a. Translators b. Timestamps c. Playback buffers answer :d. Sequence numbers The correct is d 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. a. CVF b. CSM answer :c. ECB mode d. CBC mode The correct is c 632. In the public-key method of cryptography, which key is publicly known? answer :a. Encryption key only b. Decryption key only c. Both d. None of the above The correct is a 633. A cipher is _______. a. An encryption algorithm b. A decryption algorithm c. A private key answer :d. (a) or (b) The correct is d 634. Before a message is encrypted, it is called _______. a. Ciphertext b. Cryptotext c. Cryptonite answer :d. Plaintext The correct is d 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. answer :a. 190 b. 200 c. 19 d. 20 The correct is a 636. The _______ is an example of polyalphabetic substitution. a. P-box answer :b. Vigenere cipher c. S-box d. Product block The correct is b 637. In the symmetric-key method of cryptography, which key is publicly known? a. Encryption key only

b. Decryption key only c. Both answer :d. None of the above The correct is d 638. The RSA algorithm uses a _______ cryptography method. a. Private-key b. Symmetric-key c. Denominational answer :d. Public-key The correct is d 639. The _______ is a block cipher. a. P-box b. S-box c. Product block answer :d. All the above The correct is d 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. a. Monoalphabetic substitution b. Transposition answer :c. Polyalphabetic substitution d. None of the above The correct is c 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. a. ECB mode b. CBC mode c. CFM answer :d. All the above The correct is d 642. An initialization vector is needed in the _______. a. CSM b. CBC mode c. CVF answer :d. (a) and (b) The correct is d 643. In the public-key method of cryptography, only the receiver has possession of the _______. a. Public key b. Both keys answer :c. Private key d. None of the above The correct is c 644. After a message is decrypted, it is called _______. a. Ciphertext b. Cryptotext c. Cryptonite answer :d. Plaintext The correct is d 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. a. Polyalphabetic substitution

b. Transpositional answer :c. Monoalphabetic substitution d. None of the above The correct is c 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. a. KDC answer :b. X.509 c. CA level 1 d. Kerberos The correct is b 647. Windows 2000 uses an authentication protocol called _______. a. Otway-Rees answer :b. Kerberos c. Diffie-Hellman d. Needham-Schroeder The correct is b 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. a. His or her own public key answer :b. His or her own private key c. His or her own symmetric key d. The receiver's private key The correct is b 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. a. TLS b. Firewall c. CA answer :d. KDC The correct is d 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. a. Return answer :b. Replay c. Man-in-the-middle d. Bucket brigade The correct is b 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. answer :a. Needham-Schroeder b. Diffie-Hellman c. Otway-Rees d. Kerberos The correct is a 652. If user A wants to send an encrypted message to user B, the plaintext is en crypted with the public key of _______. a. The network b. User A answer :c. User B d. (a) or (b) The correct is c

653. When symmetric-key encryption is combined with private-key encryption, the _______ key is encrypted with the public key. a. Skeleton b. Private c. Public answer :d. Symmetric The correct is d 654. The _______ issues tickets for the real server. a. Real server b. Data server answer :c. AS d. TGS The correct is c 655. In _______-key cryptography, everyone has access to all the public keys. a. Private b. Certified answer :c. Symmetric d. Public The correct is c 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. answer :a. The sender's public key b. Her or his own symmetric key c. Her or his own private key d. Her or his own public key The correct is a 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. a. Ticket b. Realm answer :c. Nonce d. Public key The correct is c 658. A _______ certifies the binding between a public key and its owner. a. KDC b. TLS answer :c. CA d. Firewall The correct is c 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. a. 90 b. 10 c. 20 answer :d. 45 The correct is d 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. a. Needham-Schroeder b. Otway-Rees answer :c. Diffie-Hellman d. Kerberos The correct is c

661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. a. Bucket-in-the-middle b. Replay c. Return answer :d. Man-in-the-middle The correct is d 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. a. PKI b. TGS answer :c. KDC d. CA The correct is c 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. a. Needham-Schroeder b. Diffie-Hellman c. Otway-Rees answer :d. Kerberos The correct is d 664. The _______ is the KDC in the Kerberos protocol. a. Real server b. Data server answer :c. AS d. TGS The correct is c 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. a. Authentication data answer :b. SPI c. Padding d. Sequence number The correct is b 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. a. Encapsulated in another datagram; encrypted answer :b. Encrypted; encapsulated in another datagram c. Authenticated; encrypted d. Encrypted; authenticated The correct is b 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. a. PGP b. ESP c. IPSec answer :d. AH The correct is d 668. An _______ is a private network with no external access that uses the TCP/I P suite. a. Internet answer :b. Intranet

c. internet d. Extranet The correct is b 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. a. PGP b. TLS c. AH answer :d. SA The correct is d 670. An _______ is a private network with limited external access that uses the TCP/IP suite. a. Intranet answer :b. Extranet c. Internet d. internet The correct is b 671. The handshake protocol and data exchange protocol are part of _______. answer :a. TLS b. CA c. KDC d. SSH The correct is a 672. _______ is a collection of protocols that provide security at the IP layer level. a. TLS b. SSH answer :c. IPSec d. PGP The correct is c 673. A method to provide for the secure transport of email is called _______. a. TLS answer :b. PGP c. SA d. IPSec The correct is b 674. A VPN uses _______ to guarantee privacy. a. IPSec b. Tunneling answer :c. Both (a) and (b) d. None of the above The correct is c 675. A _______ can forward or block messages based on the information in the mes sage itself. a. Message digest answer :b. Proxy firewall c. Packet-filter firewall d. Private key The correct is b 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. a. AH

b. PGP c. IPSec answer :d. ESP The correct is d 677. _______ is a transport layer security protocol. a. PGP b. IPSec answer :c. TLS d. AH The correct is c 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. answer :a. Protocol b. Security parameter index c. Sequence number d. Next-header The correct is a 679. A _______ network is totally isolated from the global Internet. answer :a. Private b. Hybrid c. Virtual private d. Any of the above The correct is a 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. a. Private answer :b. Hybrid c. Virtual private d. Any of the above The correct is b 681. In a VPN, _______ encrypted. a. The inner datagram is b. Neither the inner nor the outer datagram is c. The outer datagram is answer :d. Both inner and outer datagrams are The correct is d 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. a. Proxy firewall b. Message digest answer :c. Packet-filter firewall d. Private key The correct is c 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer :Default gateway 2. Why was the OSI model developed? Answer :standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer :DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer :bits

5. Which protocol below operates at the network layer in the OSI model? Answer :All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer :removed 7. Session layer of the OSI model provides Answer :Dialog control 8. IPv6 has _______ -bit addresses. Answer :128 9. Which one of the following functionalities isn\'t provided by TCP? Answer :Addressing 10. Which of the following can be an Ethernet physical address? Answer :07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer :32 1. The maximum number of nodes per segment depends on the_______.? Answer :Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer :Two 3. IEEE designates Thicknetas_______Ethernet Answer : 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer :Protocol 5. Which is not an exmple of transmission media? Answer :None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer :Heavy use 7. How many layers in the OSI model? Answer :7 8. Which device act as a traffic cop? Answer :Router 9. What is SMTP? Answer :Simple mail transport protocol 10. An organization that share devices, saves Answer :All of the above. 11. The computer you are controlling or working via a network. Answer :remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer :Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer :Presentaion layer 14. E-mail use communication protocol. Answer :SMTP 15. What is the default port number for SMTP? Answer :25 16. What is the default port number for FTP? Answer : 21 17. What is the default port number for Web server such as IIS and Apache? Answer :80 18. HTTP is the protocol use to view web pages. Answer :True 19. Which cannot support full-duplexing? Answer :100BaseT4 20. Vertical connectors between floors are known as_______. Answer :Riser

The _______ defines the client program. 2 Physical D) IP C) address Ephemeraladdress B)INCORRECT The _______ Well-known port number Answer :A)port number timer is used in the termination phase. 3 Keep-alive D) Persistence C) Time-waited B)INCORRECT Retransmission Answer :A) Which is a legal port address? 4 All D) 65,535 Answer above 513 0) the:C) A)INCORRECT The definition of reliable delivery includes _______. B 5 All D) In-order delivery Answer above Receipt of B) the:C) Which of Error-free the complete following does UDP guarantee? A)INCORRECTdelivery themessage 6 None D) Sequence numbers Answer the Flow of:C) B) controlThe source port address on Acknowledgments to each user A)INCORRECT aboveonthe sender datagram the UDP user datagram header defines ____ ___. 7 D) application program Answer :C) B) receiving host can The sending A computer on the receiving_______ A)INCORRECT computer be identified bycomputer while a program running on the h sending computer ost can be identified by _______. 8 D) C) An IP number; a well-known B)INCORRECT A port :A) Whichhostthe following Answeraddress; anportaddressport is not part of the UDP user datagram header? of address IP number 9 Destination D) Length of The C) Checksum Answer :B)header address Source port port_______ defines the server program. A)INCORRECT address 10 Physical D) Ephemeraladdress C) Well-known B) INCORRECT IP is responsible for _______ communication while TCP is responsibl IP address port number Answer :A)port number e for _______ communication. 11 Node-to-node; D) C) Host-to-host; _______ timer is B) CORRECT Process-to-process; node-to-node Answer :A) Theprocess-to-processneeded to handle the zero window-size advertisem host-to-host ent. 12 Time-waited D) Retransmission C) Keep-alive B) CORRECT Persistence Answer :A) Connection establishment involves a _______ handshake. 13 None D) Two-way C) of One-way the B) CORRECT special segment called a probe is sent by a sending TCP when the __ Three-way Answer :A) Aabove _____ timer goes off. 14 Time-waited D) Keep-alive C) Transmission B) INCORRECT Persistence Answer :A) The _______ address uniquely identifies a running application progr am. 15 Host D) Socket C) NIC Answer :B) IP INCORRECT A) address The _______ field is used to order packets of a message. 16 Checksum D) Urgent pointer Answer :C) Acknowledgment B) Sequence numbernumber A) INCORRECT The _______ field is used for error detection. 17 Checksum D) Urgent pointer Answer :C) Acknowledgment B) Sequence numbernumber A) CORRECT Multiply the header length field by _______ to find the total number of bytes in the TCP header. 2 8 68 4) INCORRECT Answer :A) Urgent data require the urgent pointer field as well as the URG bit 1 D C B in the ______ field. 19 Reserved D) Offset C) Control B) CORRECT Sequence number Answer :A) In ______, data are sent or processed at a very inefficient rate, suc h as 1 byte at a time. 20 Delayed D) Nagle's acknowledgment C) Sliding syndrome B) Silly :window syndrome A) INCORRECT The _______ timer keeps track of the time between the sending of a Answerwindow syndrome segment and the receipt of an acknowledgment. 21 Keep-alive D) Persistence C) Retransmission B) INCORRECT Time-waited Answer :A) To prevent silly window syndrome created by a receiver that process es data at a very slow rate, _______ can be used. 22 (a) D) Delayed acknowledgment Answer algorithm Nagle's solution B) or (c) Clark's:C) A) CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. 23 (a) D) Delayed acknowledgment C) or solution Clark's algorithm B) INCORRECT Nagle's(c) Answer :A) An ACK number of 1000 always means that _______. 25 None D) 1001 C) 1000 of the B) bytes hasbeen TCP are bothreceived 999 bytes hasUDP successfully receivedAnswer protocols. A) INCORRECTaboveandsuccessfullyreceived layer : been _______ 26 Transport D) Network Answer Data :C) B) link Physical A) INCORRECT Which of the following functions does UDP perform? 27 All D) Host-to-host C) the above Process-to-process data delivery B) INCORRECT UDP needs the End-to-end communication _______ Answer :A) reliablecommunication address to deliver the user datagram to the c orrect application program. 28 Port D) Physical Answer :C) Internet B) Application A) INCORRECT Karn's algorithm is used in calculations by the _______ timer. Keep-alive D) Persistence C) Retransmission B) Time-waited Answer :A) 1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer :NIC driver A. Operating system driver B. System driver C. Protocol driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? A. CPU B. Software driver C. ISA interface Answer :EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer :UTP A. Twinax

B. Fiber-optic C. Coax 4. You are running UTP cable in an Ethernet network from a workstation to a hub. Wh ich of the following items is/are included in the total length measurement of th e cable segment (as needed in determining the longest segment length)? (Choose a ll that apply.) Answer :Workstation patch cable Answer :Main cable run A. Hub internal network Answer :Hub patch cable 5. If you were going to make a 10BaseT patch cable, which tool would you use? A. Screwdriver B. Punchdown tool Answer :Wire crimper C. Tone generator 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) A. BNC Answer :DB-25 Answer :Centronics-50 B. RJ-11 C. IBM Data Connector 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? A. netstat Answer :MSD B. Ping utility C. All of the above 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? A. Bridge B. Router Answer :Repeater C. Brouter 9. A bridge can increase network efficiency by _____________________. A. Copying packets of data sent to storage and resending them as requested witho ut rereading the needed data Answer :Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment B. Defining traffic order by using Quality of Service (QoS) C. All of the above 10. What is the result of updating an old NIC driver on a system? Answer :It can correct bugs. A. It can be a good way to look like you are doing useful work. B. It can act as a protocol converter.

C. All of the above. 11. EEPROM is short for ________________________________________. A. Electronically erasable programmable read-only memory Answer :Electrically erasable programmable read-only memory B. Electronically erasable periodical only memory C. Electrically erasable powered read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. A. PCI B. Token Ring Answer :Legacy ISA C. EISA 13. A brouter combines which functions? (Choose all that apply.) Answer :Router Answer :Bridge A. Gateway B. Repeater 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? A. RJ-11 Answer :BNC B. RJ-45 C. All of the above 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? A. Wire crimper B. Punchdown tool C. Media tester Answer :Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? A. UTP B. STP Answer :Coax C. Fiber-optic 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer :Print server A. Print facilitator B. PCONSOLE.EXE C. Print manager 18. Which of the following power conditions occurs when the voltage level increases

quickly and falls just as quickly? A. Surge Answer :Spike B. Brownout C. Blackout 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer :Surge A. Spike B. Brownout C. Blackout 20. Which power condition occurs when the voltage level drops below 120 volts and st ays below for an extended period of time? A. Surge B. Spike Answer :Brownout C. Blackout Which 1. of the following are characteristic of a peer-to-peer network? (Choose all that apply.) A. It has centralized security and administration. Answer :A computer can be both a client and a server. Answer :A limited number of computers are involved. The 2. best cable choice a linking a few computers in a small office using a bus B. It does not requireforhub. Ethernet network is cable with an ___________________ designation. A. RG-47 Answer :RG-58 B. RG-59 Which 3. of C. RG-62 the following are characteristic of a true client/server environment? ( Choose all that apply.) A. It does not require a hub. B. A computer can be both a client and a server. Answer :It has centralized security and administration. A network has uses 10Base2 backup. 4. Answer :Itthat a centralizedrequires ___________________ terminators for each ne twork segment in order to function correctly. A. 0 B. 1 Answer :2 Which 5. C. 3 of the following is characteristic of a mesh network? A. It controls cable costs. Answer :It offers improved reliability. B. It is required by fire code. Which 6. type a network operate. C. It needsof token totopology uses terminators? A. Star Answer :Bus B. Ring Which 7. of C. Mesh the following best describes a star topology? Answer :It has centralized management. A. Any cable fault halts all network traffic. B. It uses less cable than a bus or ring. A 8.It is always approach uses what type of security model? C.client/server completely wireless. Answer :Centralized A. Decentralized B. Server In 9.a Thick Ethernet network, what typically connects the NIC s transceiver to the C. Distributed backbone cable?

A. Screws B. DIX Answer :Vampire Taps Plenum 10. cable has which of the following characteristics? C. Bolts A. It has a lower cost than PVC. Answer :It meets fire codes. B. It transmits data faster. Which 11. the above. C. Allof the following is the most widely used LAN wiring system for connections between desktop and server? A. STP Answer :UTP B. Coax Which 12. of the following has the highest possible throughput? C. Fiber-optic A. STP B. UTP C. Coax Which 13. :Fiber-optic Answer100-Megabit Ethernet standard is designed to use two pairs of wires in a U TP cable? A. 100BaseVG B. 10BaseF C. 100BaseT4 A transmission technology that divides that transmission medium into discrete ch 14. Answer :100BaseTX annels so that multiple signals can share the same cable is known as ___________ ________. A. Duplex communications B. Baseband communications C. Sideband communications What 15. is the primary advantage to Answer :Broadband communications network attached storage (NAS) devices over a tr aditional server? A. NAS devices have smaller monitors. Answer :NAS devices are less expensive. B. NAS devices contain more storage. An RJ-45 connector 16. C. All the above. should be wired with ____________________ pairs when used on a Category 5 UTP cable. A. 1 B. 2 Answer :4 Thicknet can be extended to ___________________ meters per segment. 17. C. 8 A. 100 B. 200 Answer :500 Which 18. network component is used in conjunction with a router to provide access t C. 1000 o a T1 circuit? A. Gateway B. T1 modem Answer :CSU/DSU Failure to 19. C. Switch terminate a bus topology properly will result in _________. A. Electrical shock hazard Answer :Unwanted signal echo B. Fire hazard What 20. device must C. All the above you install in a computer to provide it with a physical, an ele ctrical, and an electronic connection to a network? A. Router Answer :NIC B. Gateway In OSI model, as C. BNC connector data packet moves from the lower to the upper layer header are.. Answer :Removed There are two broad classes of packet-switched networks are: Answer :datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack?

Answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer :Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer :Virtual-circuit network Answer :Datagram network Which statement is correct for layering in OSI model Answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer :TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer :Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer :Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer :L/R Which one is correct about P2P network? Answer :A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer :TCP _____ provides reliable, in-order transfer of bytes between client and server Answer :TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer :Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer :The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer :All of the other SMTP stands for Answer :Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer :TCP . 20 and 21 IMAP and POP are_________ Answer :Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer :MIME TCP provides __________between application processes running on different hosts Answer :Logical communications What is WRONG about UDP? Answer :Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer :Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer :Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer :136

Which one is correct about TCP and UDP? Answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer :FIN The difference between flow control and congestion control is primarily Answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel TCP is a ___________ protocol. Answer :Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer :First What is the data unit used in Internet Protocol (IP)? Answer :Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer :Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer :32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer :All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer :2 Traceroute command uses Answer :ICMP RIP (Routing Information Protocol) in the Internet uses Answer :Distance vector routing algorithm Routers operate in the _______ layers. Answer :network Dijkstra s algorithm is Answer :A link-state routing algorithm Distance vector routing algorithm requires Answer :all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer :0000 ______ is (are) (an) example(s) of random access MAC Answer :All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer :the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer :Wireless LAN What is store-and-forward operation in switches? Answer :They receive the whole frame before forwarding to next station ______is used in Ethernet Answer :CSMA/CD Which one is the flag used for framing in PPP Answer :01111110 Which one can be a MAC address? Answer :00-D0-56-F2-B5-12 ARP stands for _________ Answer :Address Resolution Protocol Parity checking _____.

Answer :can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. a. 1s are b. A polynomial is Answer :0s are c. a CRC remainder is 2. What type of routing algorithm that OSPF use? Answer :Shortest Path Routing a. Multicast Routing b. Distance Vector Routing c. Link State Routing 3. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a a. none is correct answer :randomly generated number b. 1 c. 0 4. The ___ model shows how the network functions of a computer ought to be organ ized. Answer :OSI a. CCITT b. ANSI c. ISO 5. ___ audio/video refers to on-demand request for compressed audio/video files. Answer :Streaming live a. Interactive b. None is correct c. Streaming stored 6. The physical layer is concerned with the movement of ___ over the physical me dium. a. protocols b. dialogs answer :bits c. programs 7. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? a. OSPF b. IGRP Answer :DHCP c. HTTP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? a. burst b. single-bit c. recoverable answer :multiple-bit 9. HDLC is a ___ protocol a. character-oriented b. count-oriented c. byte-oriented answer :bit-oriented

10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncomp ressed. How long does it take to transmit it over a 1-Mbps cable modem? a. 18.874 sec b. 1.887 sec c. 337 sec answer :18874 sec 11. What flag is used to close TCP connection? Answer :FIN a. SYN b. ACK c. PSH 12. What type of routing protocol that BGP is? a. Link State Routing b. Shortest Path Routing c. Multicast Routing Answer :Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. a. port b. physical answer :none is correct c. logical 14. The ___ layer is responsible for the delivery of a message form one process to another. Answer :none is correct a. physical b. network c. transport 15. With WWW as an example of client-server computer software, the client is: a. all are correct answer :The machine that you use to display WWW documents b. The machine that you use to store WWW documents c. The machine that makes WWW documents available 16. Routers function in the ___ layers. a. none is correct b. physical and data link c. data link and network answer :physical, data link, and network 17. The purpose of MTA is a. Message preparation b. Envelope creation Answer :Transferal of message across the Internet c. a and b 18. A ___ document is created by a Web server whenever a browser requests the do cument a. dynamic b. static answer :Active c. None is correct 19. What type of service that VC network provides? Answer :Connection-oriented a. Connectionless

b. Connection-oriented and Connectionless c. None is correct 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer :6.5% a. 13.1% b. 2.6% c. 0.8% 21. ___ is more powerful and complex than ___ Answer :IMAP4; POP3 a. POP3; IMAP4 b. SMTP; POP3 c. None is correct 22. TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. a. message; message b. none is correct c. block; block answer :stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. a. out of band signaling b. none is correct c. the services of another protocol answer :an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ a. rearranged b. modified c. added answer :removed 25. Which IP option is used if exactly four specific router are to be visited by the datagram? a. record route answer :strict source route b. loose source route c. none is correct 26. What is the service that the UDP protocol provides? Answer :guaranteed delivery a. error detection b. none is correct c. flow control 27. In the OSI model, encryption and decryption are function of the ___ layer. a. session b. application answer :presentation c. transport 28. Which device can amplify and make free- noise signal to all computer in LAN? a. router b. repeater answer :all three devices c. switch 29. What is information used to route packet in network? Answer :destination address and source address fields in IP header a. source address field in IP header b. destination addressfield in IP header c. destination address, source address, and protocol fields in IP header 30. Because the sending and the receiving processes may not write or read data a

t the same speed. TCP ___ a. speeds up the slower process b. none is correct c. slows down the faster process answer :uses buffers 31. ___ specifies a physical star topology featuring a central hub and twisted-p air cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily a. one is connection-oriented, one is circuit-switched b. one is Network Layer, one is Transport Layer c. one is Transport Layer, one is Session Layer answer :one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. a. a variable-length block b. none is correct answer :a fixed number of blocks c. a fixed-length 34. In ___ resolution, the resolver expects the server to supply the final . a. none is correct b. straight answer :recursive c. iterative 35. By default, FTP uses which ports? a. 25 and 110 b. 80 and 81 c. 20 and 21 Answer :80 and 8080 Quiz Chapter1 10. Which agency developed standards for physical connection interfaces and elec tronic signaling speccifications? a. ITU-T Answer :EIA b. ANSI c. ISO 11. In the OSI model, which layer functions as a liaison between user support la yers and network support layers? a. Physical layer b. Network layer Answer :Transport layer c. Session layer 12. The Physical layer is connected with the movement of____over the physical me dium. Answer :Bits a. Dialogs b. Protocols c. Programs 13. Which of the following statement is correct? a. Full-Duplex: Communications that can go only one direction Answer :Full-Duplex: Communications in which both sender and receiver can send a t the same time b. Half-Duplex: Communications in which both sender and receiver can send at the same time c. Half-Duplex: Communications that can go only one direction 14. What is the purpose of the IEEE 802 commitlee? Answer :To develop LAN standards

b. To define some protocols for routing c. To develop IPv6 standard layers for internetworking connection d. To define seven standard layers for internetwork connection 15. MAN stands for? a. Multi-Access Network b. Major Area Network c. Metropolitan Area Network d. Multi-Access Node 16. In the OSI model, as a data packet moves from the lower to the upper layers, headers are____ a. Added Answer :Removed b. Rearranged c. Modified 17. Which of the following is an appropriate description concerning B2C? Answer :Ordering books online a. Government distributing tax forms electronically b. File sharing c. Car manufacturer ordering tires from supplier 18. Which of the following is an appropriate description concerning mobile netwo rk users? Answer :A notebook computer used in a class a. Desktop computers in offices b. Server computers in ISP c. Networks in order, unwired buildings 19. In the OSI model, encryption and decryption are functions of the_____layer. a. Application b. Session c. Transport Answer :Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of e rror is this? a. Recoverable b. Single-bit c. Multiple-bit Answer :Burst The purpose of ICMP echo request end ICMP echo reply is to . Answer :report errors in the resource records of DNS, which record is also known as an alias hostname? Answer :CNAME record Which of the following is characteristic of packet switching? Answer :Bandwidth shared. How does the HTTP protocol implement caching? Answer :using proxy server. What begins an Ethernet frame? Answer :Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer :All of the others What is information in IP header used to route packet in router? Answer :Destination Address end Source Address fields

Traceroute (tracert in Windows) sends Answer :ICMP messages Which of the following is the MAC protocol? Answer :CSMA/CD The signaling protocol is used in: Answer :Internet The HTTP request line contains a method to request a document from the server. Answer :GET Which of the following is the pipelining protocol: Answer :Automatic Repeat Request An HTTP request message always contains . Answer :a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer :10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer :CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer :Transport layer. How many duplicate ack-numbers triggartha Fast Retransmission mode? Answer :No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer :Multiple channels Which of the following describe the DHCP Discover message? Answer :It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer :Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer :F The default mode of HTTP 1.1 is ___ Answer :Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer :process identifier The receiver window is found in ____ Answer :only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer :165

What is the name of the packets processed at the network layer? Answer :Datagram Which of the following is hybrid of client-server and P2P? Answer :Skype What is the protocol used to obtain email from to an email server: Answer :IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer :Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer :MX record What is the MAC protocol used in 802.11 network? Answer :CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer :retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer :129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer :no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer :201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer :CSMA/CD Your normal PC requests a DNS to do a search: Answer :recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer :authoritative A switch processes up to which layer? Answer :Transport ______ uses dedicated links directly connected from end-to-end Answer :Circuit switched network Suppose that host 10.0.0.2 initiates a connection, using source port 5500 to a W eb server listening at port 80 at 128.119.40.186. The NAT translation table for this TCP connection. WAN side LAN side 138.76.29.7, 5002 10.0.0.2, 5500 What are the destination IP addresses and port numbers on the IP datagram arrivi ng to the WAN side of the router with interface address 138.76.29.7? Answer :Destination IP: 128.119.40.186, Destination Port: 80. This command identifies the receiver cf the message.

Answer :RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . answer :this is the last fragment. Which of the following is NOT a message of DHCP? Answer :DHCP response Which of the following is the service of link layer'? Answer :Error detection which the following is the individual characteristic of rdt3.0? answer :Sequence number added to packet. An process-to-process communication up to which layer? Answer :Transport Which the following is the individual characteristic of switch? Answer :Maintain a routing table. Which transport layer was first used for streaming media? Answer :UDP Most Internet services and intelligence is located: Answer :in ISPs The backbone ofthe Internet is run by: Answer :Tier-1 ISPs The core of the Internet consiste of: Answer :Ethernet What is the function of ARP? Answer :It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer :Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 10010101 and 10101010. Answer :00111111 What is the framming method used in PPP? Answer :Byte stuffing UDP is called a __________ transport protocol. Answer :connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer :011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer :UDP A datagram is fragmented into three smaller datagrams, Which of the following is true?

Answer :The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer :Streaming live The second phase of JPEG is_______ Answer :Quantization In the DNS, the names are defined in structure Answer :an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer :32 subnets and 8 hosts In ______ resolution, the resolver expects the server to supply the final Answer :Recursive What is the combination of an iP address and a port number called? Answer :A socket NAT used at the router to Answer :translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer :Faster than the TCP In the OSI model, which of the following is an application layer service? Answer :all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer :Control What are general functions of router? Answer :All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer :uses buffers A user needs to send the server some information. The request line method is__ Answer :POST The purpose of MTA (Mail Transfer Agent) is Answer :Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer :base64 NAT table in router Answer :Store pairs of the IP address of the host with the port number in form o f (IP address, port Answer:) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer :TCP congestion control

In error reporting the encapsulated ICMP packet goes to Answer :the original sender Whic h of the following statement is correct? Answer :Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer :Time-to-Live (TTL) What does NAT stand for? Answer :Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer :Port number Jitter is introduced in real-time data by the_____ Answer :Difference of the delay among packets Bridges work in the layers. Answer :physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer :2,6% What is the data unit used in Internet Protocol (IP)? Answer :Datagram An HTTP request message always contains________ Answer :a request line and a header DNS can use the services of _____ using the well-known port 53, Answer :UDP The _____domains define registered hosts according to their generic behavior, Answer :Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer :First A set of rules which is used by computers to communicate with each other across a network is called___ Answer :Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer :Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer :255.255.255.0 The OSI model consists of ____ layers, Answer :Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong

estion window____. Answer :Reduces to 1 Parity checking____ Answer :can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer :parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer :Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer :None of these Flow control_____ Answer :ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer :To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer :x^5+x^2+1 This command identifies the sender of the message, Answer :MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer :194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer :The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer :None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer :DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer :0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer : *A. Removed There are two broad classes of packet-switched networks are: Answer : *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer : *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer : *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___

_____Datagram network Answer : *C. Virtual-circuit network Answer : *E. Datagram network Which statement is correct for layering in OSI model Answer : *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer : * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer : *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer : *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer : *C. L/R Which one is correct about P2P network? Answer : *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer : *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer : *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer : *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer : *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer : *E. All of the other SMTP stands for Answer : *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer : *E. TCP . 20 and 21 IMAP and POP are_________ Answer : *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer : *E. MIME TCP provides __________between application processes running on different hosts Answer : *A. Logical communications What is WRONG about UDP? Answer : *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer : *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer : *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer : *C. 136 Which one is correct about TCP and UDP? Answer : *A. TCP is reliable transmission and it has congestion control and flow control while UDP is not

What flag is used to close TCP connection? Answer : *A. FIN The difference between flow control and congestion control is primarily Answer : *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer : *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer : *A. First What is the data unit used in Internet Protocol (IP)? Answer : *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer : *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer : *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer : *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer : *A. 2 Traceroute command uses Answer : *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer : *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer : *A. network Dijkstra s algorithm is Answer : *A. A link-state routing algorithm Distance vector routing algorithm requires Answer : *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer : *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer : *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer : *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer : *D. Wireless LAN What is store-and-forward operation in switches? Answer : *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer : *A. CSMA/CD Which one is the flag used for framing in PPP Answer : *B. 01111110 Which one can be a MAC address? Answer : *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer : *A. Address Resolution Protocol Parity checking _____. Answer :*A. can detect a single bit error in a transmission 36. At the CRC generate, ___ added the data unit before division process.

d. 1s are e. A polynomial is Answer: 0s are f. a CRC remainder is 37. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing d. Multicast Routing e. Distance Vector Routing f. Link State Routing 38. The bytes of data being transferred in each connection are numbered by TCP. The number starts with a d. none is correct Answer: randomly generated number e. 1 f. 0 39. The ___ model shows how the network functions of a computer ought to be orga nized. Answer: OSI d. CCITT e. ANSI f. ISO 40. ___ audio/video refers to on-demand request for compressed audio/video files . Answer: Streaming live d. Interactive e. None is correct f. Streaming stored 41. The physical layer is concerned with the movement of ___ over the physical m edium. d. protocols e. dialogs Answer: bits f. programs 42. What is the protocol that network devices (for example: modem ADSL) use to a ssign IP address to PCs in LAN automatically? d. OSPF e. IGRP Answer: DHCP f. HTTP 43. If ASCII character H is sent and the character I is received, what type of e rrors is this? d. burst e. single-bit f. recoverable Answer: multiple-bit 44. HDLC is a ___ protocol d. character-oriented e. count-oriented f. byte-oriented Answer: bit-oriented 45. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncomp

ressed. How long does it take to transmit it over a 1-Mbps cable modem? d. 18.874 sec e. 1.887 sec f. 337 sec Answer: 18874 sec 46. What flag is used to close TCP connection? Answer: FIN d. SYN e. ACK f. PSH 47. What type of routing protocol that BGP is? d. Link State Routing e. Shortest Path Routing f. Multicast Routing Answer: Distance Vector Routing 48. A bridge has access to the ___ address of a station on the same network. d. port e. physical Answer: none is correct f. logical 49. The ___ layer is responsible for the delivery of a message form one process to another. Answer: none is correct d. physical e. network f. transport 50. With WWW as an example of client-server computer software, the client is: d. all are correct Answer: The machine that you use to display WWW documents e. The machine that you use to store WWW documents f. The machine that makes WWW documents available 51. Routers function in the ___ layers. d. none is correct e. physical and data link f. data link and network Answer: physical, data link, and network 52. The purpose of MTA is d. Message preparation e. Envelope creation Answer: Transferal of message across the Internet f. a and b 53. A ___ document is created by a Web server whenever a browser requests the do cument d. dynamic e. static Answer: Active f. None is correct 54. What type of service that VC network provides? Answer: Connection-oriented d. Connectionless e. Connection-oriented and Connectionless

f. None is correct 55. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% d. 13.1% e. 2.6% f. 0.8% 56. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 d. POP3; IMAP4 e. SMTP; POP3 f. None is correct 57. TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. d. message; message e. none is correct f. block; block Answer: stream; stream 58. TCP uses ___ to check the safe and sound arrival of data. a. out of band signaling b. none is correct c. the services of another protocol Answer: an acknowledgment mechanism 59. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ a. rearranged b. modified c. added Answer: removed 60. Which IP option is used if exactly four specific router are to be visited by the datagram? a. record route Answer: strict source route b. loose source route c. none is correct 61. What is the service that the UDP protocol provides? Answer: guaranteed delivery a. error detection b. none is correct c. flow control 62. In the OSI model, encryption and decryption are function of the ___ layer. a. session b. application Answer: presentation c. transport 63. Which device can amplify and make free- noise signal to all computer in LAN? a. router b. repeater Answer: all three devices c. switch 64. What is information used to route packet in network? Answer: destination address and source address fields in IP header a. source address field in IP header b. destination addressfield in IP header c. destination address, source address, and protocol fields in IP header 65. Because the sending and the receiving processes may not write or read data a

t the same speed. TCP ___ a. speeds up the slower process b. none is correct c. slows down the faster process Answer: uses buffers 66. ___ specifies a physical star topology featuring a central hub and twisted-p air cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 Answer: None is correct 67. The difference between TCP and UDP is primarily a. one is connection-oriented, one is circuit-switched b. one is Network Layer, one is Transport Layer c. one is Transport Layer, one is Session Layer Answer: one is connection-oriented, one is connectionless 68. In classless addressing, ___ is assigned to an organization. a. a variable-length block b. none is correct Answer: a fixed number of blocks c. a fixed-length 69. In ___ resolution, the resolver expects the server to supply the final . a. none is correct b. straight Answer: recursive c. iterative 70. By default, FTP uses which ports? a. 25 and 110 b. 80 and 81 c. 20 and 21 Answer: 80 and 8080 Quiz Chapter1 20. Which agency developed standards for physical connection interfaces and elec tronic signaling speccifications? d. ITU-T Answer: EIA e. ANSI f. ISO 21. In the OSI model, which layer functions as a liaison between user support la yers and network support layers? d. Physical layer e. Network layer Answer: Transport layer f. Session layer 22. The Physical layer is connected with the movement of____over the physical me dium. Answer: Bits d. Dialogs e. Protocols f. Programs 23. Which of the following statement is correct? d. Full-Duplex: Communications that can go only one direction Answer: Full-Duplex: Communications in which both sender and receiver can se nd at the same time. Half-Duplex: Communications in which both sender and receiv er can send at the same time e. Half-Duplex: Communications that can go only one direction 24. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards e. To define some protocols for routing

f. To develop IPv6 standard layers for internetworking connection g. To define seven standard layers for internetwork connection 25. MAN stands for? e. Multi-Access Network f. Major Area Network Answer: Metropolitan Area Network g. Multi-Access Node 26. In the OSI model, as a data packet moves from the lower to the upper layers, headers are____ d. Added Answer: Removed e. Rearranged f. Modified 27. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online d. Government distributing tax forms electronically e. File sharing f. Car manufacturer ordering tires from supplier 28. Which of the following is an appropriate description concerning mobile netwo rk users? Answer: A notebook computer used in a class d. Desktop computers in offices e. Server computers in ISP f. Networks in order, unwired buildings 29. In the OSI model, encryption and decryption are functions of the_____layer. d. Application e. Session f. Transport g. Presentation Quiz Chapter3 12. If ASCII character G is sent and the character D is received, what type of e rror is this? d. Recoverable Answer: Single-bit Burst 13. At the CRC generate, added the data unit before division process. Answer: 0s are a. A polynomial is b. A CRC remainder is c. 1s are 14. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state a. Networking b. Teminating c. Authenticating Answer: Establishing 15. According to the PPP transition state datagram, verification of user identif ication occurs in the state a. Networking b. Establishing Answer: Authenticating c. Teminating 16. At the CRC checker,______if the data unit is damaged. a. A stream of 0s b. A stream alternating of 0s, 1s c. A stream of 1s Answer: A nonzero remainder 17. HDLC is a________protocol a. Byte-oriented b. Count-oriented Answer: Bit-oriented

c. Character-oriented 18. If ASCII character H is sent and the character I is received, what type of e rror is this? Answer: Single-bit a. Multiple-bit b. Burst c. Recoverable 19. In cyclic redundancy checking, what is CRC a. The divisor Answer: The remainder b. The quotient c. The dividend 20. In sliding window flow control, if the size is 63, what the range sequence n umbers? b. 1 to 64 c. 0 to 64 Answer: 0 to 63 d. 1 to 63 21. What is present in the HDLC control fiels for I-frame Answer: All are correct b. N(S) c. N(R) d. P/F bit 11. G At the CRC generate, ___ added the data unit before division process. g. 1s are h. A polynomial is Answer: 0s are i. a CRC remainder is Quiz Chapter4 8. What device can . Answer: All 9. . 10. Maximun of data flow through in N-port switch (an with L2) Answer: N a. N-1 b. N/2 c. N/4 11. How many collision domains has the computer with 88 computers, 10hubs and 2 repeaters? Answer: 1 12. Repeaters function in the layer Answer: Physical 13. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 14. What network device decreases collision switch Answer: Transceiver 15. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP a. OSPF b. HTTP c. IGRP 12. What is information used to route packet in network? a. Destination Address, Source Address, and Protocol fields in IP header b. Source Address fields in IP header

Answer: Destination Address fields in IP header c. Destination Address and Source Address fields in IP header 13. What type of routing algorithm that OSPF use?---------------------------a. LinkState Routing b. Multicast Routing Answer: Shortest Path Routing c. Distance Vector Routing 14. What does the IP header s protocol field identify? a. The data link layer protocol that will carry the datagram b. The application that generated the message carried in the datagram Answer: The transport layer protocol that generated the information in the data field c. The physical layer specification of the network that will carry the datagram 15. What is the IP address used to test a PC s network card that don t need connect PC to another PC? Answer: All are correct a. 127.1.2.3 b. 127.0.0.127 c. 127.0.0.1 16. IP is________datagram protocol Answer: Both a and b a. Connectionless b. Unreliable d.None is correct 17. In classless addressing,_______is assigned to an organization. a. None is correct b. A fixed-length c. A fixed number of blocks Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? a. Network b. Transport Answer: Physical c. Data link 19. DHCP is used to: a. Assign IP ports automatically b. Assign MAC addresses automatically c. Assign host names automatically Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------a. FTP b. ARP Answer: ICMP c. DHCP 11. In classless addressing, the ______ is another name for the common part of the address range. A) suffix Answer: prefix C) netid D) none of the above 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct . Answer: suffix B) prefix C) hostid D) none of the above 13 In classless addressing, the prefix length defines the _____________.

A) netid B) hostid Answer: mask D) none of the above 14 The number of addresses assigned to an organization in classless address ing _______. A) can be any number B) must be a multiple of 256 Answer: must be a power of 2 D) none of the above 15 The first address assigned to an organization in classless addressing __ _____. A) must be a power of 4 Answer: must be evenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) none of the above 16 Which address could be the beginning address of a block of 32 classless addresses? A) B) Answer: D) 2.4.6.5 2.4.6.16 2.4.6.64 none of the above

17 Which address could be the beginning address of a block of 16 classless addresses? A) B) C) Answer: 2.4.6.5 2.4.6.15 2.4.6.62 none of the above

18 Which address could be the beginning address of a block of 256 classless addresses? A) 2.4.6.5 B) 2.4.6.15 Answer: 2.4.6.0 D) none of the above 19. What type of routing protocol that BGP is? a. b. c. LinkState Routing Shortest Path Routing Multicast Routing

Answer: Distance Vector Routing Quiz Chapter6 11. What is the data unit used in TCP? a. Packet Answer: Segment b. Frame c. Datagram 12. What is the service that the UDP protocol provides? a. Flow control

Answer: Guaranteed delivery b. Error detection c. None is correct 13. What flag is used to close TCP connection? a. PSH b. ACK c. SYN Answer: FIN 14. Because the sending and the receiving processes may not write or read data a t the same speed, TCP______ a. Speeds up the slower process b. Slows down the faster process Answer: Uses buffers c. None is correct 15. The difference between TCP and UDP is primarily a. One is Network Layer, one is Transport Layer Answer: One is connection-oriented, one is connectionless b. One is Transport Layer, one is Session Layer c. One is connection-oriented, one is circuit-switched 16. TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream a. Block; block b. None is correct c. Message; message 17. TCP uses______________to check the safe and sound arrival of data. a. The services of another protocol b. Out-of-band signaling c. None is correct Answer: An acknowledgment mechanism 18. TCP is a (n)__________transport protocol. Answer: Reliable a. Unreliable b. None is correct c. Best-effort delivery 19. What is the combination of an IP address and a port number called? a. A sequence number b. A checksum c. A data offset Answer: A socket 20. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a a. 1 Answer: Randomly generated number b. None is correct c. 0 Quiz Chapter7 11. ______is used to compress video. a. Either a or b b. MPEG Answer: JPEG c. None is correct 12. According to the Nyquist theorem, we need to sample an analog signal______ti mes the highest frequency. a. Three Answer: Two b. Four c. None is correct 13. ______is more powerful and complex than______. a. SMTP; POP3

Answer: IMAP4; POP3 b. None is correct c. POP3; IMAP4 14. What does the URL need to acess a document a. Pathname b. Host computer c. Retrieval method Answer: All are correct 15. The purpose of MTA is a. Message preparation b. Envelope creation Answer: Transferal of message across the Internet c. A and b 16. A_____document is created by a Web server whenever a browser requests the do cument. Answer: Static a. None is correct b. Dynamic c. Active 17. With WWW as an example of client-server computer software, the server is: a. The machine that you use to display WWW documents b. The machine that enables you to connect to the Internet Answer: The machine that makes WWW document available c. All are correct 18. _____audio/video refers to on-demand requests for compressed audio/video fil es. Answer: Streaming stored a. None is correct b. Streaming live c. Interactive 19. In______resolution, the resolver expects the server to supply the final . a. Straight b. None is correct c. Iterative Answer: Recursive 20. By default, FTP uses which ports? Answer: 20 and 21 a. 25 and 110 b. 80 and 8080 c. 80 and 81 11 . Currently two message access protocols are available:_____ and_____. a.POP3; IMAP2 b.POP4; MAP1 Answer:.POP3; IMAP4 d.none of the above 12 With WWW as an example of client-server computer software, the client is : a. all are correct

Answer: The machine that you use to display WWW documents c. d. The machine that you use to store WWW documents The machine that makes WWW documents available

Quiz Chapter1 30. Which agency developed standards for physical connection interfaces and elec tronic signaling speccifications?

g. ITU-T Answer: EIA h. ANSI i. ISO 31. In the OSI model, which layer functions as a liaison between user support la yers and network support layers? g. Physical layer h. Network layer Answer: Transport layer i. Session layer 32. The Physical layer is connected with the movement of____over the physical me dium. Answer: Bits g. Dialogs h. Protocols i. Programs 33. Which of the following statement is correct? f. Full-Duplex: Communications that can go only one direction Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time g. Half-Duplex: Communications in which both sender and receiver can send at the same time h. Half-Duplex: Communications that can go only one direction 34. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards h. To define some protocols for routing i. To develop IPv6 standard layers for internetworking connection j. To define seven standard layers for internetwork connection 35. MAN stands for? h. Multi-Access Network i. Major Area Network j. Metropolitan Area Network k. Multi-Access Node 36. In the OSI model, as a data packet moves from the lower to the upper layers, headers are____ g. Added Answer: Removed h. Rearranged i. Modified 37. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online g. Government distributing tax forms electronically h. File sharing i. Car manufacturer ordering tires from supplier 38. Which of the following is an appropriate description concerning mobile netwo rk users? Answer: A notebook computer used in a class g. Desktop computers in offices h. Server computers in ISP i. Networks in order, unwired buildings 39. In the OSI model, encryption and decryption are functions of the_____layer. h. Application i. Session j. Transport Answer: Presentation Quiz Chapter3 22. If ASCII character G is sent and the character D is received, what type of e rror is this? e. Recoverable f. Single-bit

g. Multiple-bit Answer: Burst 23. At the CRC generate, added the data unit before division process. Answer: 0s are d. A polynomial is e. A CRC remainder is f. 1s are 24. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state d. Networking e. Teminating f. Authenticating Answer: Establishing 25. According to the PPP transition state datagram, verification of user identif ication occurs in the state d. Networking e. Establishing Answer: Authenticating f. Teminating 26. At the CRC checker,______if the data unit is damaged. d. A stream of 0s e. A stream alternating of 0s, 1s f. A stream of 1s Answer: A nonzero remainder 27. HDLC is a________protocol d. Byte-oriented e. Count-oriented Answer: Bit-oriented f. Character-oriented 28. If ASCII character H is sent and the character I is received, what type of e rror is this? Answer: Single-bit d. Multiple-bit e. Burst f. Recoverable 29. In cyclic redundancy checking, what is CRC d. The divisor Answer: The remainder e. The quotient f. The dividend 30. In sliding window flow control, if the size is 63, what the range sequence n umbers? e. 1 to 64 f. 0 to 64 Answer: 0 to 63 g. 1 to 63 31. What is present in the HDLC control fiels for I-frame Answer: All are correct e. N(S) f. N(R) g. P/F bit 11. G At the CRC generate, ___ added the data unit before division process. j. 1s are k. A polynomial is Answer: 0s are l. a CRC remainder is Quiz Chapter4 16. What device can Answer: All .

17. . 18. Maximun of data flow through in N-port switch (an with L2) Answer: N d. N-1 e. N/2 f. N/4 19. How many collision domains has the computer with 88 computers, 10hubs and 2 repeaters? Answer: 1 20. Repeaters function in the layer Answer: Physical 21. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 22. What network device decreases collision switch Answer: Transceiver 23. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 21. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP d. OSPF e. HTTP f. IGRP 22. What is information used to route packet in network? d. Destination Address, Source Address, and Protocol fields in IP header e. Source Address fields in IP header Answer: Destination Address fields in IP header f. Destination Address and Source Address fields in IP header 23. What type of routing algorithm that OSPF use?---------------------------d. LinkState Routing e. Multicast Routing Answer: Shortest Path Routing f. Distance Vector Routing 24. What does the IP header s protocol field identify? d. The data link layer protocol that will carry the datagram e. The application that generated the message carried in the datagram Answer: The transport layer protocol that generated the information in the data field f. The physical layer specification of the network that will carry the datagram 25. What is the IP address used to test a PC s network card that don t need connect PC to another PC? Answer: All are correct d. 127.1.2.3 e. 127.0.0.127 f. 127.0.0.1 26. IP is________datagram protocol Answer: Both a and b c. Connectionless d. Unreliable d.None is correct 27. In classless addressing,_______is assigned to an organization. d. None is correct e. A fixed-length f. A fixed number of blocks Answer: A variable-length block------------------------------------28. Which layer does ICMP reside in? d. Network e. Transport

Answer: Physical f. Data link 29. DHCP is used to: d. Assign IP ports automatically e. Assign MAC addresses automatically f. Assign host names automatically Answer: Assign IP addresses automatically 30. What is protocol used to inform errors concerning IP?----------------------------d. FTP e. ARP Answer: ICMP f. DHCP 11. In classless addressing, the ______ is another name for the common part of the address range. A) suffix Answer: prefix C) netid D) none of the above 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct . Answer: suffix B) prefix C) hostid D) none of the above 13 In classless addressing, the prefix length defines the _____________.

A) netid B) hostid Answer: mask D) none of the above 14 The number of addresses assigned to an organization in classless address ing _______. A) can be any number B) must be a multiple of 256 Answer: must be a power of 2 D) none of the above 15 The first address assigned to an organization in classless addressing __ _____. A) must be a power of 4 Answer: must be evenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) none of the above 16 Which address could be the beginning address of a block of 32 classless addresses? A) B) Answer: D) 2.4.6.5 2.4.6.16 2.4.6.64 none of the above

17 Which address could be the beginning address of a block of 16 classless addresses? A) B) 2.4.6.5 2.4.6.15

C) 2.4.6.62 Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? A) 2.4.6.5 B) 2.4.6.15 Answer: 2.4.6.0 D) none of the above 19. What type of routing protocol that BGP is? a. b. c. LinkState Routing Shortest Path Routing Multicast Routing

Answer: Distance Vector Routing Quiz Chapter6 21. What is the data unit used in TCP? d. Packet Answer: Segment e. Frame f. Datagram 22. What is the service that the UDP protocol provides? d. Flow control Answer: Guaranteed delivery e. Error detection f. None is correct 23. What flag is used to close TCP connection? d. PSH e. ACK f. SYN Answer: FIN 24. Because the sending and the receiving processes may not write or read data a t the same speed, TCP______ d. Speeds up the slower process e. Slows down the faster process Answer: Uses buffers f. None is correct 25. The difference between TCP and UDP is primarily d. One is Network Layer, one is Transport Layer Answer: One is connection-oriented, one is connectionless e. One is Transport Layer, one is Session Layer f. One is connection-oriented, one is circuit-switched 26. TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream d. Block; block e. None is correct f. Message; message 27. TCP uses______________to check the safe and sound arrival of data. d. The services of another protocol e. Out-of-band signaling f. None is correct Answer: An acknowledgment mechanism 28. TCP is a (n)__________transport protocol. Answer: Reliable

d. Unreliable e. None is correct f. Best-effort delivery 29. What is the combination of an IP address and a port number called? d. A sequence number e. A checksum f. A data offset Answer: A socket 30. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a d. 1 Answer: Randomly generated number e. None is correct f. 0 Quiz Chapter7 21. ______is used to compress video. d. Either a or b e. MPEG Answer: JPEG f. None is correct 22. According to the Nyquist theorem, we need to sample an analog signal______ti mes the highest frequency. d. Three Answer: Two e. Four f. None is correct 23. ______is more powerful and complex than______. d. SMTP; POP3 Answer: IMAP4; POP3 e. None is correct f. POP3; IMAP4 24. What does the URL need to acess a document d. Pathname e. Host computer f. Retrieval method Answer: All are correct 25. The purpose of MTA is d. Message preparation e. Envelope creation Answer: Transferal of message across the Internet f. A and b 26. A_____document is created by a Web server whenever a browser requests the do cument. Answer: Static d. None is correct e. Dynamic f. Active 27. With WWW as an example of client-server computer software, the server is: d. The machine that you use to display WWW documents e. The machine that enables you to connect to the Internet Answer: The machine that makes WWW document available f. All are correct 28. _____audio/video refers to on-demand requests for compressed audio/video fil es. Answer: Streaming stored d. None is correct e. Streaming live f. Interactive 29. In______resolution, the resolver expects the server to supply the final . d. Straight

e. None is correct f. Iterative Answer: Recursive 30. By default, FTP uses which ports? Answer: 20 and 21 d. 25 and 110 e. 80 and 8080 f. 80 and 81 11 . Currently two message access protocols are available:_____ and_____. a.POP3; IMAP2 b.POP4; MAP1 Answer: POP3; IMAP4 d.none of the above 12 With WWW as an example of client-server computer software, the client is : a. all are correct

Answer: The machine that you use to display WWW documents c. d. The machine that you use to store WWW documents The machine that makes WWW documents available

71. At the CRC generate, ___ added the data unit before division process. m. 1s are n. A polynomial is Answer: 0s are o. a CRC remainder is 72. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing g. Multicast Routing h. Distance Vector Routing i. Link State Routing 73. The bytes of data being transferred in each connection are numbered by TCP. The number starts with a g. none is correct Answer: randomly generated number h. 1 i. 0 74. The ___ model shows how the network functions of a computer ought to be orga nized. Answer: OSI g. CCITT h. ANSI i. ISO 75. ___ audio/video refers to on-demand request for compressed audio/video files . Answer: Streaming live g. Interactive h. None is correct i. Streaming stored 76. The physical layer is concerned with the movement of ___ over the physical m edium.

g. protocols h. dialogs Answer: bits i. programs 77. What is the protocol that network devices (for example: modem ADSL) use to a ssign IP address to PCs in LAN automatically? g. OSPF h. IGRP Answer: DHCP i. HTTP 78. If ASCII character H is sent and the character I is received, what type of e rrors is this? g. burst h. single-bit i. recoverable Answer: multiple-bit 79. HDLC is a ___ protocol g. character-oriented h. count-oriented i. byte-oriented Answer: bit-oriented 80. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncomp ressed. How long does it take to transmit it over a 1-Mbps cable modem? g. 18.874 sec h. 1.887 sec i. 337 sec Answer: 18874 sec 81. What flag is used to close TCP connection? Answer: FIN g. SYN h. ACK i. PSH 82. What type of routing protocol that BGP is? g. Link State Routing h. Shortest Path Routing i. Multicast Routing Answer: Distance Vector Routing 83. A bridge has access to the ___ address of a station on the same network. g. port h. physical Answer: none is correct i. logical 84. The ___ layer is responsible for the delivery of a message form one process to another. Answer: none is correct g. physical h. network i. transport 85. With WWW as an example of client-server computer software, the client is: g. all are correct Answer: The machine that you use to display WWW documents

h. The machine that you use to store WWW documents i. The machine that makes WWW documents available 86. Routers function in the ___ layers. g. none is correct h. physical and data link i. data link and network Answer: physical, data link, and network 87. The purpose of MTA is g. Message preparation h. Envelope creation Answer: Transferal of message across the Internet i. a and b 88. A ___ document is created by a Web server whenever a browser requests the do cument g. dynamic h. static Answer: Active i. None is correct 89. What type of service that VC network provides? Answer: Connection-oriented g. Connectionless h. Connection-oriented and Connectionless i. None is correct 90. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% g. 13.1% h. 2.6% i. 0.8% 91. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 g. POP3; IMAP4 h. SMTP; POP3 i. None is correct 92. TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. g. message; message h. none is correct i. block; block Answer: stream; stream 93. TCP uses ___ to check the safe and sound arrival of data. a. out of band signaling b. none is correct c. the services of another protocol Answer: an acknowledgment mechanism 94. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ a. rearranged b. modified c. added Answer: removed 95. Which IP option is used if exactly four specific router are to be visited by the datagram?

a. record route Answer: strict source route b. loose source route c. none is correct 96. What is the service that the UDP protocol provides? Answer: guaranteed delivery a. error detection b. none is correct c. flow control 97. In the OSI model, encryption and decryption are function of the ___ layer. a. session b. application Answer: presentation c. transport 98. Which device can amplify and make free- noise signal to all computer in LAN? a. router b. repeater Answer: all three devices c. switch 99. What is information used to route packet in network? Answer: destination address and source address fields in IP header a. source address field in IP header b. destination addressfield in IP header c. destination address, source address, and protocol fields in IP header 100. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ a. speeds up the slower process b. none is correct c. slows down the faster process Answer: uses buffers 101. ___ specifies a physical star topology featuring a central hub and twistedpair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 102. The difference between TCP and UDP is primarily a. one is connection-oriented, one is circuit-switched b. one is Network Layer, one is Transport Layer c. one is Transport Layer, one is Session Layer Answer: one is connection-oriented, one is connectionless 103. In classless addressing, ___ is assigned to an organization. a. a variable-length block b. none is correct Answer: a fixed number of blocks c. a fixed-length 104. In ___ resolution, the resolver expects the server to supply the final . a. none is correct b. straight Answer: recursive c. iterative 105. By default, FTP uses which ports? a. 25 and 110 b. 80 and 81 c. 20 and 21 Answer: 80 and 8080

CCNA 1

Chapter 1: Computing Basics Question 1: b What is NIC? a. A WAN adapter Answer: A printed circuit board that provides network communication b. A card uses only for Etherner networks c. A standardized datalink layer address Question 2: c What must computers on a network have in common in order to directly communic ate with each other? a. Use the same operating system b. Use the same hardware Answer: Use the same protocol c. Built by the same company Question 3: a What is LAN? Answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. a. A network that connects workstations, terminals, and other devices a large me tropolitan area. b. A network that serves users across a geographically large area and often uses transmission devices provided by a common carrier. c. A network that covers a larger area than a MAN Question 4: b What do WAN do? a. Allows printer and file sharing Answer: Operate over a large geographic area b. Operates over a metropolitan area to host connectivity within a limmited area c. Provide host Question 5: c What type of numbering system is characterized by ones and zeros? a. Base 4 b. Base 10 Answer: Binary c. Hexadecimal Question 6: c Which numbering system is based on powers of 2? a. Octal b. Hexadecimal Answer: Binary c. ASCII Question 7: b What is the decimal number 151 in binary? a. 10100111 Answer: 10010111 b. 10101011 c. 10010011 Question 8: d What is the binary number 11011010 in decimal? a. 186 b. 202 c. 222 Answer: 218

Question 9: b Bandwidth is described in _________? a. Bytes per second Answer: Bits per second b. Megabits per milisecond c. Centimeters Question 10: c What term is usec to describe the rated throughput capacity of a given n etwork medium or protocol? a. TCP/IP b. Ethernet Answer: Bandwidth c. Routing protocol Chapter 2: Q1: a Which layer offers provisions for data expedition, class of service, and exception reporting? Answer: Session a. Presentation b. Network c. Datalink Q2: b Which of the following is the PDU for the transport layer? a. Frame Answer: Segment b. Packet c. Bits Q3: c Which layer of the OSI model provides connectivity and path selection be tween two end systems where routing occurs? a. Physical Layer b. Data Link Layer Answer: Network Layer c. Transport Layer Q4: d Which layer of the OSI model is responsible for reliable network communi cation between end nodes and provides mechanisms for the establishment, maintena nce, and termination of virtual circuits, transport fault detection and recovery , and information flow control? a. Physical Layer b. Data Link Layer c. Network Layer Answer: Transport Layer Q5: b Which of the following best describes the function of the presentation l ayer? a. Responsible for the reliable network communication between end nodes. Answer: Concerned with data structures and negotiation data transfer syntax b. Provides connectivity and path selection between two end systems c. Manages data exchange between layer entities Q6: a What functions are the data link layer concerned with?

Answer: Physical addressing, network topology, and media access. a. Manages data exchange between presentation layer entities b. Synchronizes cooperating applications, and establishes agreement on procedure s for error recovery and contronl of data integrity c. Provides mechanisms for the establishment, maintenance, and termination of vi rtual circuits, transport fault detection, recovery, and information flow contro l. Q7: d Which of the following protocols uses UDP as its underlying protocol? a. SMTP b. FTP c. HTTP Answer: TFTP Q8: b Which of the following statements regarding TCP/IP is true? a. TCP/IP combines the OSI data link and session layer issues into its applicati on layer Answer: TCP/IP combines the OSI data link and physical layers into one layer b. TCP/IP combines the OSI network and application layers into one network layer c. TCP/IP combines the bottom four layers of the OSI model into one Internet lay er Q9: a Packets are encapsulation in frames at which layer of the OSI model? Answer: Data link a. Network b. Transport c. Session Q10: b In the TCP/IP model which layer would deal with reliability, flow contro l, and error correction? a. Application Answer: Transport b. Internet c. Network Access Chapter 3: Q1: b A NIC is considered an OSI layer _____ device a. One Answer: Two c. Three d. Four Q2: a A hub is an OSI layer ____ device Answer: One b. Two c. Four d. Six Q3: c Which of the following is true concerning a bridge and its forwarding de cisions? a. They operate at OSI layer 2 and use IP addresses to make decisions. b. They operate at OSI layer 3 and use IP addresses to make decisions. Answer: They operate at OSI layer 2 and use MAC addresses to make decisions.

c. They operate at OSI layer 3 and use MAC addresses to make decisions. Q4: b Which of the following is true concerning the function of a switch? a. Increases the sizes of collision domains Answer: Combines the connectivity of a hub with the traffic regulation of a brid ge b. Combines the connectivity of a hub with the traffic directing of a router c. Performs Layer 4 path selection Q5: c What do routers connect? a. Bridges and repeaters b. Bridges and hubs Answer: Two or more networks c. Hubs and nodes Q6: c What does a router route? a. Layer 1 bits b. Layer 2 frames Answer: Layer 3 packets c. Layer 4 segments Q7: a What is the correct order of encapsulation? Answer: Data, segment, Packet, Frame, Bits a. Data, Frame, Packet, Segment, Bits b. Data, Packet, Frame, Segment, Bits c. Data, Bits, Packet, Frame, Segments Q8: c Which LAN topology connects all workstations to a central point, usually a hub or a switch? a. Bus b. Ring Answer: Star c. Hierarchical Q9: d When connecting four host computers in a LAN what is the minimum hardwar e needed to be used for file sharing capability? a. Cloud b. Switch c. Router Answer: Hub Q 10: c If 4 hosts are connected to a hub and then to the Internet, how many IP addresses are required for these 5 devices? a. One b. Two Answer: Four c. Five Chapter 4: Q1: b What kind of power is supplied to the microchips on the motherboard of a computer? a. AC

Answer: DC b. RC c. MC Q2: a Where is the safely ground connected for a computer? Answer: Exposed metal parts a. The monitor b. The mouse c. The network connection Q3: d Electrons flow in ___ loops called ____ a. Open, voltage b. Closed, voltage c. Open, circuits Answer: Closed, circuits Q4: a A half duplex circuit means Answer: Only one side can talk at a time b. The signal strength is cut in half c. The signal strength is doubled d. Two hosts can set half their data Q5: c Attenuation means a. Travel b. Delay Answer: A signal losing strength to its surroundings c. All of the above Q6: a Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? Answer: EMI caused by electrical motors a. RFI caused by electrical motors b. Impedance caused by radio systems c. EMI caused by lighting Q7: d What is the primary cause of crosstalk? a. Cable wires that are too large in diameter b. Too much noise in a cable s data signal c. Electrical motors and lighting Answer: Electrical signals from other wires in a cable Q8: b Which of the following describes cancellation? a. Wires in the same circuit cancel each other s electrical current flow Answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference b. The magnetic fields from one cable run cancel magnetic fields of another cabl e run c. External magnetic fields cancel the fields inside network cabling Q9: c What is it called when two bits from two different communicating compute rs are on a shared medium at the same time? a. Latency

b. Dispersion Answer: Collision c. Obstruction Q10: a ____ means converting binary data into a form that can travel on a physi cal communications link Answer: Encoding a. Decoding b. Encrypting c. Decrypting Chapter 5: Q11: a The network area within which data packets originate and collide is call ed a _____? Answer: Collision domain a. Network domain b. Collision segment c. Network segment shield Q2: b What happens to packets that are involved in a collision? a. The packets return to the originator Answer: The Packets are destroyed bit by bit b. The Packets continue on to the target device with corrupt data c. Another Q3: c What is another name for a rollover cable? a. A patch cable b. A cross-connect cable Answer: A console cable c. An inverted cable Q4: c Using repeaters ____ the collision domain a. Reduces b. Has no effect on Answer: Extends c. Another Q5: c What does the twisting of the wires do in a CAT-5 cable? a. Make it thinner b. Make it less expensive Answer: Reduce noise problems c. Allow 6 pairs to fit in the space of 4 pairs Q6: b Which best describes a collision in a Ethernet network? a. The effects of having too many repeaters in a network Answer: The result of two nodes transmitting at the same time b. The effect when two nodes have the same MAC address. c. The result of having non OSI compliant protocols on the network Q7: a How many collision domains exist in a network containing two hubs? Answer: One a. Two

b. Three c. Five Q8: c Seperating collision domains with bridges, switches and routers is calle d ____ a. Switching domains b. Extending domains Answer: Segmentation c. Fragmentation Q 9: b Which best describes bus topology? a. All of its nodes connected directly to a central point (like a hub) Answer: All of its nodes connected directly to one physical link b. All nodes connected to each other (fully meshed) c. All nodes connected to exactly 2 other nodes Q 10: a Which of the following best describes an extended star topology? Answer: LAN topology where a central hub is connected by a vertical cabling to o ther hubs a. LAN topology in which transmissions from network stations propagate the lengt h of a single coaxial cable and are received by all other stations b. LAN topology in which end points on a network are connected to a common centr al switch by point-to-point links c. LAN topology where central points on a network are connected to a common cent ral switch by linear links Chapter 6: Q1: a Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? Answer: IEEE 802.3 a. IEEE 802.5. b. EIA?TIA 568B c. EIA/TIA 569 Q2: a Which is not one of the recognized IEEE sublayers? Answer: Data link Control a. Media access control b. Logical link control c. Another Q 3: a Why did the IEEE create LLC? Answer: To meet the need to have part of the datalink layer function be independ ent of existing technologies a. To replace an older IBM protocol b. To create a protocol that would not be control by the US government c. To allow for data encryption before transmission Q4: b Convert the decimal number 2989 to Hex a. FDD1 Answer: BAD b. TED c. CAD

Q5: a Convert the hex number ABE into decimal Answer: 2750 a. 5027 b. 2570 c. 7250 Q6: b Convert the binary number 11100010 to hex a. D2 Answer: E2 b. G2 c. H20 Q7: a Which of the following statements best describes communication between t wo devices on a LAN? Answer: The source device encapsulates data in a frame with the MAC address of th e destination device, transmits, everyone on the LAN sees it, but the devices wi th non-matching addresses otherwise ignore the frame a. The source encapsulates the data and places a destination MAC address in the f rame. It puts the frame on the LAN, where only the device with matching address can check the address field b. The source device encapsulates data in a frame with the MAC address of the De stination device, puts in on the LAN, and the device with the matching address r emoves the frame c. Each device on the LAN receives the frame and passes it up to the computer, wh ere software will decide whether to keep or discard the frame Q8: b A frame is a ______ a. Layer 1 PDU Answer: Layer 2 PDU b. Layer 3 PDU c. Layer 4 PDU Q9: c How does a computer on a LAN detect an error in a frame? a. Send a copy of the frame back to the sender for verification b. Check the destination address to verify that the frame was really intended fo r them Answer: Compare a FCS in the frame to one that the computer calculates from the contents of the frame c. Calculate a checksum from the data in the frame, and send it back to the sour ce for verification Q 10: c Which is true of a deterministic MAC protocol? a. It defines collisions and specifies what to do about them b. It allows the hub to determine the number of users active at any one time Answer: It allows hosts to take their turn for sending data c. It allows the use of a talking stick by network administrators to control the m edia access of any users considered troublemakers Chapter 7: Q1: a Which of the following describe Token-Ring? Answer: Data transfer rates of 4 Mbps or 16 Mbps a. Typically found with a linear bus topology b. Can only be implemented with fiber

c. Uses collision detection for access method Q 2: c The data/command frame and token frame have which of the following field s in common? a. Start delimiter, frame check sequence (FCS), and access control b. Start delimiter, token control, and end delimiter Answer: Start delimiter, access control, and end delimiter c. Another Q3: d What is the difference between single-mode and multi-mode FDDI? a. Single-mode allows one mode of light to propagate through the fiber (1) b. Single-mode is capable of higher bandwidth than multi-mode (2) c. Single-mode can run longer distance than multi-mode (3) Answer: All (1), (2), (3) Q4: d One of the primary reasons FDDI is extremely reliable is because ____? a. It uses CAT 3 cabling b. It is a CSMA/CD network c. It is a CSMA/CA network Answer: Of it s dual ring design Q5: a If you hava to connect a FDDI between buildings, which mode of fiber woul d you use? Answer: Single-mode a. Multi-mode b. Intra-mode c. Inter-mode Q6: a Which of the following is an accurate description of an Ethernet variety ? Answer: 10BASE T uses and transmits at 10 Mbps a. 10BASE - TX uses CAT5 and transmits at 100 Mbps b. 10BASE T uses CAT2 and transmits at 10 Mbps c. 100BASE FX is multi-mode fiber that transits at 10Mbps Q7: c The Ethernet version 2 header is ____ the header of an 802.3 frame a. Much longer than b. Much shorter than Answer: The same length as c. Completely different than Q8: c Which of the following is true regarding 10BASET signals? a. They use no type encoding b. They do not use any type of clocking signal when transmitting Answer: Designed to send and receive signals over a segment that consists of 4 w ires c. Designed to send and receive signals over a segment that consists of 6 wires Q9: b A _____ diminishes the traffic experienced by devices on all connected segments, because only a certain percentage of traffic is forwarded a. Hub Answer: Bridge

b. Repeater c. NIC Q10: b Which of the following best describes a broadcast storm? a. A frame that will be sent to all nodes on a network Answer: When too many broadcasts are sent out over the network b. A section of a network that is bounded by bridges, routers, or switches c. The network areas within which frames that have collided are propagated Chapter 8: Q1: c If Acme Inc. occupies the first three floors of a building and each floo r is 1500 square meters, how many wiring closets should be installed according t o EIA/TIA 569? a. One b. Three Answer: Six c. Nine Q2: c Which of the following is a specification for walls, floors, and ceiling s of a wiring closet? a. A maximum of 3.65m feet of wall space should be provided for terminations and related equipment for the POP b. Rooms selected for wiring closets should have a dropped or false ceiling for easy access Answer: Interior walls on which equipment is to be mounted should be covered wit h 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 c m c. Fire retardant paint should never be used to cover interior walls due to heal th and safety restrictions Q3: b Which of the following is a requirement for room and equipment access in a wiring closet? a. The door should be at least 1.2 m wide and should swing open into the room ro ensure easy access to the room for workers and equipment Answer: The wiring closet should lock from an outside access in such a way that exiting from the room is always possible. b. Wiring hubs and patch panels must be wall-mountd using hinged wall brackets t hat are attached directly to the underlying wall surface c. When a distribution rack is usesd to mount patch panels and wiring hubs, the minimum distance for the rack from the wall should be 15 cm Q4: Question 1: What is the purpose of the safety ground in a computer? A. connects the hot wire to the chassis B. prevents metal parts from discharging hazardous voltage through the chassis C. connects the neutral wire to the chassis Answer: prevents metal parts from becoming energized with a hazardous voltage Question 2: What best describes a wiring closet specification?

A. under a

No horizontal cabling coming from work areas should be run

raised floor. B. All cable leaving the room to intermediate distribution facilities and computer and communications rooms located on other floors of a building should be via 8 cm (or smaller) conduits or sleeved cores. ?C. Any wall or ceiling openings provided for conduits or sleeved cores must be sealed with smoke and flame retardant materials. Answer: The room should be equipped with a single stage sprinkler system. Question 3: When starting to design a network, what should be the first step in the process? Answer: collecting information about the organization B. gathering information about the network devices and media that will be used C. documenting costs and developing a budget for implementation D. identifying the resources and constraints of the organization Question 4: What happens if you touch two objects with different potential voltages? A. nothing Answer: you complete the circuit and get a shock C. the computer receives a power surge D. the computer may lose data Question 5: What kind of floor should the wiring room have? Answer: tile or other finished surface B. carpet C. unfinished stone D. electronics grade carpet Question 6: How can the creation of potentially dangerous circuits between buildings be avoided? A. A voltage regulator, that will shut off the network if the voltage gets too high, should be installed at both buildings. Answer: Fiber-optic cable should be used as the backbone of the network. C. Shielded twisted pair (STP) cable should be used as the backbone of the network. D. New ground wires should be installed so that the energy potentials between the buildings will be the same. Question 7:

What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? A. Nothing, because IEEE standards separate LAN networking media from power connections. B. The networking media could allow the network to run at higher speeds. C. The networking media would ground the signal preventing it from operating normally. Answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. Question 8: Why should fluorescent light fixtures be avoided in wiring closets? A. They provide false color lighting which can lead to mistakes in making connections. Answer:. They generate outside interference. C. They can degrade some plastic materials used in network equipment. D. There often is insufficient room in a wiring closet to change out the fluorescent bulbs easily and safely. Question 9: In what types of situations will a safety ground connection not be sufficient? Answer:. building B. when identical C. when that defeats the earth D. when different potential when the earth ground is attached to multiple floors of a the earth grounds between two parts of a network are the power plant sends an irregular surge of power ground ground wires in separate locations have slightly

Question 10: How can UTP backbone cabling facilitate entry of lightning into a building? A. The insulation in the wire acts as a lightning rod and attracts the strike. Answer:. The copper provides a pathway for lightning to enter a building. C. It won't facilitate lightning strikes if the wire is fused at both ends. D. It does not facilitate lightning strikes unless the copper has been damaged. Question 11:

What best describes the problems caused by electrostatic discharge (ESD)? A. It erases power supplies, hard drives, and RAM. Answer:. It destroys semiconductors and data. C. It shoots alternating current through a computer. D. It overwrites the BIOS chip. Question 12: If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA/TIA 569? A. one B. three Answer:. six D. nine Question 13: What is the first step in locating a wiring closet for a network? A. Identify the number of computers that will be part of the network. B. Identify the number of printers and file servers that will be part of the network. Answer:. Identify on a floor plan, all devices that will be connected to the network. D. Identify the topological requirements of devices that will be in the network. Question 14: What kind of power disturbances can be caused by strikes? A. oscillations B. sags Answer:. surges D. brownouts Question 15: What network device is used in an extended star topology when the catchment area of one wiring closet is not enough? Answer:. repeater B. backoff C. terminator D. suppressor Question 16: What is a common cause of oscillation often called harmonics? Answer:. excessively long electrical wiring runs B. nearby lightning strikes C. a power line that falls below 80% of the normal voltage D. power company switching operations Question 17: Why are common mode problems a hazard to you or your computer? Answer:. They go directly to the computer chassis. B. They go directly to the computer's CPU. C. They short wires to the power supply. D. They fuse computer components.

Question 18: Where should the main distribution facility (MDF) be located in a multi-story building using an extended star topology? A. next to the POP B. on the first floor Answer:. on one of the middle floors D. in the basement Question 19: What best describes the difference between alternating and direct current? A.DC helps computers to work more efficiently, whereas AC can cause noise. B. AC flows at a constant value, whereas DC rises and falls. C.DC shifts ions from pole to pole, whereas AC ions run in one direction. Answer:. DC flows at a constant value, whereas AC rises and falls. Question 20: How does AC line noise create problems? A. by overflowing the logic gates Answer:. by adding unwanted voltage to the desired signals C. by hindering the CPU in detecting signal waves D. by intensifying the leading and trailing edges on signals Question 21: What is the "one-hand rule?" Answer:. Only touch electrical devices with one hand at a time to prevent electricity from flowing through the body. B. When setting up the network only use one bare hand--always wear a glove on at least one hand. C. When using tools that are not insulated only use one hand, hold onto a ground with the other hand. D. There is no such rule. Question 22: Which type of networking media is now installed most often for backbone cabling? A. 100 ohm unshielded twisted pair cable B. 150 ohm shielded twisted pair cable Answer:. 62.5/125 micron fiber-optic cable D. 50 ohm coaxial cable Chapter 9 Question 1: Which of the following is a source that can produce interference on UTP cable? Answer:. fluorescent lights B. fiber-optic cabling C. bridges D. coaxial cabling

Question 2: Why are split pairs a problem for network installations? A. The wires are unshielded and easily lose synchronicity. Answer:. The wires are part of different circuits so signals are not protected and cross-talk occurs. C. The wires are part of different circuits and easily shorted out by power spikes. D. It is difficult to detect split pairs which requires performing a wire map. Question 3: When should cable not be routed in an existing raceway? A. if the raceway distance exceeds 100 feet B. if the raceway material is partially metallic Answer:. if it already contains a power cable D. if it contains a telephone line Question 4: What is the central junction for the network cable? A. POP B. server C. center point Answer:. wiring closet Question 5: What should be used to mount cable to a wall? Answer:. tie wraps B. electrical tape C. staples D. paperclips Question 6: If you have one wiring closet and you want to add more, what name is given to additional wiring closets? Answer:. IDFs B. MDFs C. Extended Stars D. POPs Question 7: All the items below are personal safety precautions before you install cable except : A. Wear long sleeves. B. Wear long pants. Answer:. Wear baggy clothes. D. Check for power cables. Question 8: What tool would you use to attach CAT5 cable to a patch panel? A. 110 patch tool B. cable terminator Answer:. punch tool D. patch terminator Question 9: What is one advantage of using distribution racks for mounting patch panels? Answer:. allows easy access to both the front and back of the equipmen t

B. C. D.

provides neutral ground inexpensive compared to brackets requires minimal wall space

Question 10: Why is the wiring sequence critical when RJ-45 jacks are used at the telecommunications outlet in a horizontal cabling scheme? Answer:. For the network to function properly. B. Improper wiring sequence will short out the connection. C. You could get a nasty electrical shock. D. The collision rate is adversely affected. Question 11: What is the most important thing to do before you work in walls, ceilings or attics? A. Label the faceplate. B. Measure out the cable. Answer:. Turn off power to the area. D. Install the patch panel. Question 12: What kind of jack must be used for making a connection to a Category 5 unshielded twisted pair cable in a horizontal cabling scheme? Answer:. RJ-45 B. BNC C. UTP 55 D. EIA 45 Question 13: Why shouldn't you install a jack in the bottom five centimeters of a wooden baseboard? Answer:. The bottom plate of the wall will prevent you from pushing th e box into the baseboard. B. Most floors have metal supports that produce electromagnetic interference when close to the jack. C. Dust and dirt accumulate under it that can then get into the connection and affect network performance. D. It's so close to the floor, there isn't enough space for most people to work and manipulate the wires. Question 14: Which of the following describes a cable tester measurement of signal attenuation? Answer:. It measures the reduction in power of a signal received from a signal injector. B. It measures the increase in power of a signal received from a signal injector. C. The signal injector attaches to the near end of the cable. D. The frequency to be used for testing is specified in EIA/TIA 568A. Question 15: How is an RJ-45 jack surface mounted? A. with a punch tool B. with Velcro C. flush with the surface Answer:. adhesive backed or screw box Question 16:

What is the first thing you should do if near-end crosstalk is detected? A. Redo all connections at the patch panel. B. Isolate which connection is the cause by running a TDR test. C. Redo all connections at the cross connects. Answer:. Visually check the horizontal cabling. Question 17: Which best describes a patch panel's function? A. It serves as a temporary fix to network problems. B. It acts as a router for temporary networks connecting the various devices often found at conventions and shows. Answer:. It acts as a switchboard where horizontal cabling from workst ations can be connected to other devices to form a LAN. D. It allows the network administrator to test the entire network cabling from a single location. Question 18: How many pins are on each of the ports of a patch panel? A. 4 pins Answer:. 8 pins C. 11 pins D. 45 pins Question 19: What should be done when preparing to run cable? A. Cut the cable before pulling it. B. Unroll it before pulling it through the ceiling. Answer:. Label the boxes and cable. D. Take the cable out of the boxes. Question 20: What kind of a cable must you use when laying cable through spaces where air is circulated? A. shielded B. double coated Answer:. fire rated D. unshielded Question 21: How does a cable tester (a TDR) measure distance? A. The cable tester identifies signal degradation, indicating the cable is longer than the acceptable maximum length. B. It determines the time a signal takes to be reflected back from closed-ended cable. Answer:. It times the signal sent towards and reflected back from the end of an open-ended cable. D. It measures the ability of other devices on the network to receive and send signals through the cable. Question 22: What type of raceway should be used if it will be visible in the room? A. channel guide Answer:. decorative C. ladder rack D. gutter Question 23: Why is establishing a baseline performance level for a network important?

A. for fulfilling one of the requirements necessary for you to get your network certification B. for providing your client with proof of a successful installation Answer:. for future periodic testing of the network and diagnostics D. for obtaining a network registration and identification number from TIA/EIA and IEEE Question 24: What is a rough diagram that shows where the cable runs are located called? Answer:. cut sheet B. sketch C. cable plan D. cabling route Question 25: When running cable from the wiring closet to wall jacks, where is the cable itself labeled? A. at each tie Answer:. at each end C. at the jack end D. at the panel end Chapter 10 Question 1: What characteristic must hosts on a network possess in order to communicate directly ? A. same vendor code Answer:. same network ID C. same MAC address D. separate subnets Question 2: Which of the following describes the effect of subnetting on the amount of broadcast traffic? Answer:. decreases it, because broadcasts are not forwarded outside a subnet B. decreases it, because it will take less time for a host to get broadcasts from the routers. C. increases it, because the packets must be forwarded to all subnets D. increases it, because router's duplicate broadcasts Question 3: Which of the following correctly describes an ISP? A. Internal Service Protection B. Internal Service Provider Answer:. Internet Service Provider D. Internet Service Protection Question 4: Which of the following is an example of a Class C broadcast address? A. 190.12.253.255 B. 190.44.255.255 Answer:. 221.218.253.255 D. 129.219.145.255

Question 5: What is decimal number 164 in binary? Answer:. 10100100 B. 10010010 C. 11000100 D. 10101010 Question 6: Which of the following is the approximate number of hosts supported in a Class B unsubnetted network? A. 254 B. 2024 Answer:. 65 thousand D. 16 million Question 7: Which of the following describes the relationship between path determination and the routing of packets? A. performed only by switches B. performed only by different devices C. they are different processes Answer:. they are the same process Question 8: Which OSI layer adds an IP header? A. Layer 1 B. Layer 2 Answer:. Layer 3 D. Layer 4 Question 9: Which type of addressing scheme is formed by MAC addresses? Answer:. flat B. circular C. hierarchical D. elliptical Question 10: Which address(es) appear in an IP packet's header? A. source address B. destination address Answer:. source and destination addresses D. there are no addresses in the IP packet header. Question 11: Which of the following is a benefit of network segmentation? Answer:. reduced congestion B. reduced equipment requirements C. creation of more IP addresses D. creation of more MAC addresses Question 12: Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer:. 205.255.170.205 B. 109.255.170.109 C. 205.127.200.205 D. 109.127.200.109

Question 13: Which octet(s) are assigned locally in a class B address? A. The first octet is assigned locally. B. The second octet is assigned locally. C. The first and second octets are assigned locally. Answer:. The third and fourth octets are assigned locally. Question 14: What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? A. 2 B. 4 Answer:. 6 D. 8 Question 15: What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? A. partitions B. autonomous systems Answer:. subnets D. divisions Question 16: Which class of network addresses allows the borrowing of 15 bits to create subnets? Answer:. Class A B. Class B C. Class C D. No class of network allows the borrowing of 15 bits. Question 17: Which part of a network layer address does the router use during path determination? A. the host address B. the router address C. the server address Answer:. the network address Question 18: Which of the following represents the use of binary ones in a subnet mask? A. host bits B. subnet bits C. network bits Answer:. subnet and network bits Question 19: How large is the network/subnet portion of a Class B license having a subnet mask of 255.255.240.0? A. 18 bits B. 19 bits Answer:. 20 bits D. That is an invalid mask for a Class B network. Question 20: How many bits are in an IP address? A. 4 B. 8 C. 16

Answer:.

32

Question 21: How many total subnets can be created if four bits are borrowed from the host field? A. 8 Answer:. 16 C. 32 D. 64 Question 22: What is specified by the network number in an IP address? Answer:. the network to which the host belongs B. the physical identity of the computer on the network C. the node of the subnetwork which is being addressed D. the broadcast identity of subnetwork Question 23: Which of the following assists devices on the same network in determining a packet's final destination? A. source IP address B. vendor number C. host protocol Answer:. host ID Question 24: Which of the following would be the largest possible number expressed by an 8 bit binary number? A. 0 Answer:. 11111111 C. 10101011 D. 10101010 Question 25: Which of the following best describes the address 139.219.255.255 in an unsubnetted environment? A. Class A broadcast address B. Class B host address Answer:. Class B broadcast address D. Class C host address Chapter 11 Question 1: The IP address for a router interface should be part of what? Answer:. the network attached to the interface B. any network attached to the router C. it does not matter D. router interfaces never have IP addresses Question 2: When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? A. IP address of the router B. MAC address of the router C. MAC address of the destination device Answer:. IP address of the destination host Question 3:

What is the correct term for when routes are learned automatically? A. static routing B. automatic routing C. enhanced routing Answer:. dynamic routing Question 4: What do bridges and switches use to make data forwarding decisions? A. logical addresses Answer:. physical addresses C. network addresses D. IP addresses Question 5: Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer:. router B. hub C. bridge D. switch Question 6: Which type of routing protocol is RIP? Answer:. distance vector B. link state C. hybrid D. spanning tree Question 7: Router ARP tables hold information from which of the following? A. all Ethernet LANs Answer:. all networks connected to them C. all networks in the Internet D. MAC addresses only Question 8: What is the most common protocol used to transfer routing information between routers located on the same network? A. OSPF Answer:. RIP C. IGRP D. EIGRP Question 9: In a connection-oriented system, what happens before any user data is transferred? A. a connection is established with the recipient's local router Answer:. a connection is established between the sender and receiver C. a connection is established with the sender's local router D. the destination is not contacted before any actual data is sent Question 10: What happens if a data packet reaches a router that is destined for a network with which that router is not directly connected? A. The router forwards the packet to all other routers. B. The router returns the packet to the source device with no explanation. Answer:. The router forwards the packet to another router that most li kely contains information about the destination.

D. The router returns the packet to the source device with the explanation that the destination was unreachable. Question 11: Which of the following contains a unique network number that is used in routing? A. MAC address B. physical address Answer:. IP address D. NIC card Question 12: Which protocol is used to dynamically assign IP addresses? Answer:. DHCP B. ARP C. proxy ARP D. IGRP Question 13: Connection-oriented network processes are often referred to as what? A. packet switched B. segment switched Answer:. circuit switched D. network switched Question 14: Which describes the changes made to a packet's IP destination address, as that packet is passed from router to router on it's way to the destination host? A. The destination IP address changes each hop, to be the address of the next router. B. The destination IP address changes anytime a router is sending the packet over a WAN. C. The destination IP address will always be the address of the first router. Answer:. The destination IP address never changes. Question 15: Which protocol can find the MAC address of a computer given its IP address? A. RARP B. DHCP Answer:. ARP D. Proxy RARP Question 16: Why is a static route the preferred method for reaching stub networks? Answer:. static routing requires less overhead B. static routing requires more overhead on the network C. this allows routers to adjust to changes in the network D. the routes are learned automatically Question 17: What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer:. proxy ARP B. proxy RARP C. RARP D. subnetting

Question 18: Which is an example of a routed protocol? A. RIP Answer:. IPX/SPX C. EIGRP D. OSPF Question 19: IP relies upon which OSI layer protocol to determine whether packets have been lost and request retransmission? A. application B. presentation C. session Answer:. transport Question 20: What do routers use to exchange routing tables and share route information? A. routed protocols B. transport protocols Answer:. routing protocols D. UDP protocols Question 21: Which type of routing allows routers to adjust to changing network conditions? A. static Answer:. dynamic C. automatic D. stub Question 22: Which of the following is an example of an IGP (Interior Gateway Protocol)? A. IPX B. SPX C. UDP Answer:. IGRP Question 23: In a connectionless system, which of the following is correct? Answer:. The destination is not contacted before a packet is sent. B. The destination is contacted before a packet is sent. C. A connectionless connection is established with the recipient before a packet is sent. D. A non-connection is established between the sender and recipient before a packet is sent. Question 24: Which is a network layer protocol that can be routed? Answer:. IP B. ISP C. NetBEUI D. ARP Question 25: What are the two proprietary routing protocols developed by Cisco? A. RIP and OSPF Answer:. IGRP and EIGRP

C. D.

IPX and SPX TCP and IP

Question 26: When configuring a host computer, which of the following describes the router interface that connects to the same network segment? A. default interface Answer:. default gateway C. default port D. default subnet Chapter 12+13+14 (have no ) Question 1: Which of the following is a main function of the presentation layer? A. dialogue control B. managing applications C. windowing D. data compression Question 2: Which simple protocol exchanges datagrams, without acknowledgements or guarantee d delivery? A. TCP B. ASP C. TCP/IP D. UDP Question 3: What is the correct term for the orderly initiation, termination, and managing o f communication? A. dialogue separation B. dialogue control C. segmentation D. expectational acknowledgement Question 4: Which layer of the OSI model is responsible for the compression of files? A. transport B. session C. presentation D. application Question 5: What type of tion? A. two-way B. two-way C. two-way D. one-way communication is used when two messages can cross during a conversa simultaneous continuous alternate alternate

Question 6: What is the term used when sound files are downloaded while they are playing? A. Musical Instrument Digital Interface B. EBCDIC C. video streaming D. streaming audio Question 7: Which term refers to the amount of data that can be transmitted before receiving

an A. B. C. D.

acknowledgement? window size closed connection two way handshake expectational acknowledgement

Question 8: What is it called when the session layer decides whether to use two-way simultan eous or two-way alternate communication? A. expectational acknowledgement B. dialogue separation C. resynchronization D. dialogue control Question 9: If one system uses EBCDIC and a second system uses ASCII, which layer provides t he translation between the two different types of code? A. Layer 6 B. Layer 5 C. Layer 4 D. Layer 3 Question 10: What file format acts as a set of directions that tell a web browser how to disp lay and manage documents? A. HTML B. HTTP C. MIDI D. JPEG Question 11: Since TCP reassembles segments into complete messages, what happens if a sequenc e number is missing in the series? A. The segment is dropped. B. The missing segment is re-transmitted. C. All segments are retransmitted from the beginning. D. Sequence numbers are never checked when using TCP. Question 12: Which ports are reserved by TCP and UDP for public applications? A. numbers from 255 to 1023 B. numbers below 255 C. numbers above 1023 D. numbers from 0 to 1023 Question 13: Which layer is responsible for data encryption? A. Layer 7 B. Layer 6 C. Layer 5 D. Layer 4 Question 14: Which of the following would describe Transmission Control Protocol? A. unreliable B. connection-oriented C. connectionless D. Layer 3 Question 15:

What is the correct term for the sequence that synchronizes a connection at both ends before any user data is exchanged? A. closed connection B. segment retransmission C. three-way handshake D. sliding windows Question 16: The session layer establishes, manages, and terminates sessions between ________ _____. A. networks B. servers C. applications D. media Question 17: What type of A. two-way B. two-way C. two-way D. one-way communication avoids interrupts by taking turns? simultaneous symmetric alternate continuous

Question 18: Which of the following is a characteristic of TCP? A. unreliable B. connectionless C. divides outgoing messages into segments D. provides no software checking for segments Question 19: Which layer of the OSI model has the primary duty of regulating the flow of info rmation from source to destination reliably and accurately? A. presentation B. session C. transport D. network Question 20: Which of the following would be an example of an important Layer 5 protocol? A. OSPF B. NFS C. IGRP D. FTP Question 21: What is ASCII and EBCDIC used to format? A. graphics B. text C. digitized music D. video Question 22: What are two file formats used by the Internet applications to display still ima ges? A. WAV and HTML B. PICT and MIDI C. GIF and JPEG D. MPEG and TIFF

Question 23: Which layer of the OSI model is responsible for presenting data in a form that t he receiving device can understand? A. transport B. session C. presentation D. application Question 24: At which OSI layer does TCP operate? A. Layer 4 B. Layer 5 C. Layer 6 D. Layer 7 Question 25: In a TCP segment, which field defines the number of octets a recipient is willin g to accept? A. flag B. checksum C. window D. HLEN Chapter 15 Question 1: In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer:nswer:. the domain B. the protocol to be used C. the type of resource to contact D. the folder Question 2: The Telnet application works mainly at which layers of the OSI model? A. application and presentation Answer:nswer:. application, presentation, and session C. presentation and session D. presentation, session, and transport Question 3: Which application layer protocol supports e-mail programs? A. SNMP Answer:nswer:. POP3 C. TFTP D. Telnet Question 4: What is the language used to create web pages? A. HTTP Answer:nswer:. HTML C. GIF D. ASCII Question 5: What is an example of an application that requires both a client and server comp onent in order to function? Answer:nswer:. web browser B. Microsoft Word C. ASCII D. PICT

Question 6: If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer:nswer:. redirector B. file locator C. StorFil D. SNMP Question 7: Which of the following allows for routing that is based on classes of address, r ather than individual addresses? A. DNS address B. MAC address C. WINs address Answer:nswer:. IP address Question 8: Which protocol is designed to download or upload files on the Internet? A. SNMP B. Telnet Answer:nswer:. FTP D. HTTP Question 9: Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? A. transport B. session C. presentation Answer:nswer:. application Question 10: Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? A. extender B. TCP Answer:nswer:. redirector D. Uniform Resource Locator Question 11: Which connection is made to a server and maintained until the user terminates th e connection? A. printing a file from a web page B. an FTP connection Answer:nswer:. downloading a web page D. processing a web transaction Question 12: What type of server is used to translate a domain name into the associated IP ad dress? A. FTP Answer:nswer:. DNS C. TFTP D. DHCP Question 13: E-mail addresses consist of which two parts? Answer:nswer:. recipient's username and postoffice address B. InterNIC name and postoffice address

C. D.

server ID and router ID Electronic portfolio and IP address

Question 14: Which OSI layer does not provide support for any other OSI layer? Answer:nswer:. application B. session C. network D. physical Question 15: Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? A. network redirector Answer:nswer:. hyperlink C. web browser D. ASCII Exam Exam1 Question 1: What is the data-link destination address of a broadcast message? A. 111.111.111.111 B. 255.255.255.255 C. AAAA.AAAA.AAAA Answer:nswer:. FFFF.FFFF.FFFF Question 2: What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? A. The name server looks at the request and replies with the MAC address of ho st B. B. All devices look at the request and any device will reply with the IP addre ss of host B. Answer:nswer:. All devices look at the request and ONLY host B will reply with the MAC address. D. The nearest router looks at the request and replies with the MAC address of host B or forwards the request to another router. Question 3: Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? A. Application B. Presentation Answer:nswer:. Session D. Transport Question 4: Which best describes the structure of a MAC address? A. 16 bit network code plus 16 bit serial number B. 16 bit vendor code plus 16 bit serial number Answer:nswer:. 24 bit vendor code plus 24 bit serial number D. 24 bit network identity plus 24 bit host identity Question 5: Which best describes the function of the Physical Layer? A. Provides network services to user applications. B. Establishes, maintains, and manages sessions between applications. C. Uses a MAC address to provide transmission across media and handles error n

otification, network topology, and flow control. Answer: Provides electrical, mechanical, procedural and functional means for a ctivating and maintaining links between systems. Question 6: What best describes the functions of the Application Layer? A. Establishes, manages, and terminates applications B. Supports communicating components of applications such as e-mail Answer:nswer:. Defines end-to-end delivery of packets D. Translates between different data formats such as ASCII and EBCDIC Question 7: What happens after a collision has occurred on a network after the jam signal is sent? A. The router clears the route and notifies the source to resend Answer:nswer:. All stations stop sending frames for a randomly selected time p eriod C. A keepalive signal is generated to hold the message until the route clears D. The source station waits for the collision to dissipate and then broadcasts an all clear Question 8: Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? A. Hub B. Bridge Answer:nswer:. Ethernet switch D. Router Question 9: Why has a layered network model been developed? A. Stabilizes development times and reduces number of proprietary hardware sch emes. B. Takes a holistic approach to networking and encourages comprehensive engine ering solutions. Answer:nswer:. Accelerates evolution, ensures interoperable technology and fac ilitates modular engineering. D. Increases complexity and flexibility to deal with multiple sources of hardw are. Question 10: Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? Answer:nswer:. Windowing B. Broadcasting C. Error recovery D. Collision avoidance Question 11: If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? A. 2 B. 6 Answer:nswer:. 14 D. 30 Question 12: During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss?

A. Recovery and flow control B. Encapsulation and broadcasting Answer:nswer:. Acknowledgement and retransmission D. Synchronization and acknowledgement Question 13: Which Layer of the OSI model is concerned with the topology of a network? A. Transport B. Network Answer:nswer:. Data Link D. Physical Question 14: Which network device provides internetworking and broadcast control? A. Hub B. Bridge C. Ethernet switch Answer:nswer:. Router Question 15: Where is the Layer 2 address found on a workstation? A. In the routing table Answer:nswer:. On the network interface card C. In the name server table D. It is located on the DHCP server Question 16: What are the most common LAN technologies used in networking today? A. Ethernet, token ring, DecNET Answer:nswer:. Ethernet, token ring, FDDI C. Ethernet, DecNET, FDDI D. Ethernet, token ring, ARCnet Question 17: Which of the following is true about a CSMA/CD network? A. Signals are always sent in multi-frame broadcast mode. B. One node's transmission goes to the nearest router that sends it directly t o the destination. C. Signals are sent directly to the destination if both the MAC and IP address es are known by the source. Answer: One node's transmission traverses the entire network and is seen and che cked by every node. Question 18: Which Layer of the OSI model provides data representation and code formatting? A. Application Layer Answer:nswer:. Presentation Layer C. Session Layer D. Transport Layer Question 19: What correctly describes the five conversion steps of data encapsulation? Answer:nswer:. Data-segments-packets-frames-bits B. Data-packets-segments-frames-bits C. Data-frames-segments-packets-bits D. Data-segments-frames-packets-bits Question 20: Which OSI Layer determines best path selection?

A. Transport Layer Answer:nswer:. Network Layer C. Data Link Layer D. Physical Layer Question 21: Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? Answer:nswer:. There will be no response. B. The router will respond with the MAC address of host Z. C. The router will respond with it's own MAC address. D. The router will forward the request to the correct subnet so host Z can res pond. Question 22: Which Layer of the OSI model handles data encryption? A. Application Answer:nswer:. Presentation C. Session D. Transport Exam2 Question 1: Routers make forwarding decisions based on which kind of address? Answer:nswer:. logical B. layer 2 C. physical D. hardware Question 2: Which Cisco IOS command is used to enter privileged mode? A. admin B. root Answer:nswer:. enable D. privileged Question 3: What is the default user-mode prompt for a Cisco router? A. # B. Router Answer:nswer:. Router> D. Router% Question 4: What do WAN Data link protocols describe? A. The electrical, mechanical, operational, and functional connections B. The process used for error detection Answer:nswer:. How frames are carried between systems D. How applications are started and stopped Question 5: What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? A. It indicates that you are in help mode B. It indicates that you are in privileged mode Answer:nswer:. It indicates the location of an error in a command string D. It indicates that more information must be entered to complete the command Question 6: What best describes Frame Relay?

Answer:nswer:. Uses high quality digital facilities with no error correction B. Digital service that transmits voice and data over existing telephone lines C. Provides router-to-router and host-to-network connections over synchronous and asynchronous circuits D. Supports point-to-point and multipoint configurations over high speed analo g circuits Question 7: Which layers of the OSI model do WAN standards describe? A. Data link and network B. Network and transport C. Physical and application Answer:nswer:. Physical and data link Question 8: Which is an example of a data circuit terminating equipment (DCE)? Answer:nswer:. Modem B. Computer C. Router D. Multiplexer Question 9: What is the prompt of a Cisco router in the priviledged mode? A. Router> Answer:nswer:. Router C. Router(config-if) D. Router(config-router) Question 10: Which packet-switched service is more efficent than X.25? Answer:nswer:. Frame Relay B. Digitial Subscriber Line C. Asynchronous Transfer Mode D. Switched Multimegabit Data Service Question 11: If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? A. Help Answer:nswer:. ? C. CTRL-H D. CTRL-P Question 12: What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? A. The end key B. The tab key Answer:nswer:. The spacebar D. The page down key Question 13: Which memory component of a router loses its content when the router is turned o ff? Answer:nswer:. RAM B. ROM C. FLASH D. NVRAM

Question 14: What can only be done in privileged mode on Cisco routers? A. Enter Commands B. Check routing tables C. Monitor performance Answer: Change the configuration Question 15: Which character is used to enter the help mode? A. ! Answer:nswer:. ? C. * D. % Question 16: Which protocol does a WAN use to make path determination decisions? A. RIP B. IGRP Answer:nswer:. IP D. OSPF Question 17: Which WAN protocol supports point-to-point and multipoint configurations? Answer: HDLC B. CHAP C. PPP D. ISDN Question 18: Which of the following WAN technologies is a Circuit-Switched Service? A. Asynchronous Transfer Mode Answer: Narrowband ISDN C. Frame Relay D. Switched Multimegabit Data Service Question 19: Which of the following WAN technologies is a Cell-Switched Service? A. Frame Relay B. ISDN Answer: Asynchronous Transfer Mode D. POTS Question 20: Which of the following are stored in NVRAM? A. Routing Tables Answer: Configuration Files C. IOS Image D. Power on diagnostics Question 21: What do the WAN Physical Layer standards describe? A. Interface between SDLC and HDLC Answer: Interface between DTE and DCE C. How frames are sent and verified D. How voice and data traffic are routed Question 22: Which keystroke will recall the previous command entry on a Cisco router user in terface? A. Left arrow

B. Right arrow C. Down arrow Answer:. Up arrow Question 23: Which service does a WAN provide to LANs? A. Direct routing with error checking B. IP addressing and secure data transfer C. High speed multiple access to data networks Answer:. Exchange of data packets between routers and the LANs they support Question 24: In which Layer of the OSI Model do WAN routers operate? A. Transport Layer Answer: Network Layer C. Data Link Layer D. Physical Layer Question 25: When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? Answer: User mode B. Enable mode C. Privileged mode D. Global configuration mode Exam3 Question 1: Which Cisco IOS command shows the configuration file stored in NVRAM? A. show version B. show running-config Answer: show startup-config D. show interfaces Question 2: Which external configuration source is used with a modem? A. TFTP Server Answer: AuxiliaryPort C. Console Terminal D. Virtual Terminal Question 3: The show interface serial Cisco IOS router command can display which one of the following lines of information? A. DecNET routing is enabled. B. System image file is c4500-j-mz. Answer: Serial1 is up, line protocol is up. D. IOS (tm) 4500 Software (C4500-J-M), Experimental Version. Question 4: Which router component stores configuration files even when power is off? A. RAM B. ROM C. Flash Answer: NVRAM Question 5: What is the router prompt for the interface configuration mode? A. Router(config)

Answer: Router(config-if) C. Router(config-line) D. Router(config-router) Question 6: Which protocol is used to show summary configuration information about a directl y connected Cisco router? A. Network Control Protocol Answer: Cisco Discovery Protocol C. Address Resolution Protocol D. Transmission Control Protocol Question 7: Which Cisco IOS command is used to show current telnet connections? A. show telnet B. show history C. show version Answer: show sessions Question 8: What is the correct command to go from the user EXEC mode to the privileged EXEC mode? A. login Answer: enable C. interface type number D. configure terminal Question 9: Which Cisco IOS command displays routing table entries? A. ping B. trace Answer: show ip route D. show interface Question 10: What is stored in working RAM and is constantly updated when the router is worki ng properly? A. IOS B. Command Executive Answer: Routing Table D. Active Configuration File Question 11: When is the configuration file loaded into RAM? Answer: Each time the router is initialized B. Each time the routing tables are updated C. Each time the command copy run start is issued D. Each time the router is place in the priviliged EXEC mode Question 12: Which command will indicate the status of IP, IPX, and AppleTalk? A. show version B. show interfaces C. show startup-config Answer: show protocols Question 13: What is the first thing the router does when power is turned on? A. Copies the IOS into RAM Answer: Executes a bootstrap program

C. D.

Configures the interfaces for IP routing Loads the Startup-Configurations file into RAM

Question 14: Which port is used to initially configure a router? A. Auxiliary Answer: Console C. Serial D. BRI Question 15: Which response to the appropriate show command indicates an operational serial l ink? Answer: Serial1 is up, line protocol is up B. Serial1 is up, line protocol is down C. Serial1 is down, line protocol is down D. Serial1 is administratively down, line protocol is down Question 16: Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? A. SETUP Answer: RXBOOT C. Privileged EXEC D. Global configuration Question 17: How many Telnet sessions can a Cisco router have simultaneously? A. 10 B. 7 Answer: 5 D. 1 Question 18: Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? A. show mem B. show flash C. show running-config Answer:nswer:. show startup-config Question 19: Which router component provides working memory for configuration files and routi ng tables? Answer:nswer:. RAM B. ROM C. Flash D. NVRAM Question 20: Which command shows the status of Ethernet, Serial, BRI, and other ports? A. show version Answer:nswer:. show interfaces C. show running-config D. show startup-config Question 21: Which router component is responsible for the power-on bootstrap sequence? A. RAM Answer:nswer:. ROM

C. D.

Flash NVRAM

Question 22: Which command displays information about the current Cisco IOS software version running on a router? A. show stacks Answer:nswer:. show version C. show interface D. show startup-config Question 23: In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? A. Layer 1 Answer:nswer:. Layer 2 C. Layer 3 D. Layer 4 Exam 4 Question 1: Which Cisco IOS command displays the backup configuration file stored in NVRAM? A. Router#show flash B. Router#show nvram C. Router#show running-config Answer:nswer:. Router#show startup-config Question 2: While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? A. pound signs - example #yes# B. parentheses - example (yes) C. percent signs - example %yes% Answer:nswer:. square brackets - example [yes] Question 3: What is the first global configuration parameter set when using the setup mode? A. enable password B. routing protocol Answer:nswer:. host name of the router D. interface configuration Question 4: What is the function of the erase startup-config command? A. It deletes the current IOS from NVRAM B. It deletes the configuration file in RAM Answer:nswer:. It deletes the configuration file in NVRAM D. It deletes the bootstrap image from Flash memory Question 5: You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? A. copy config startup-config Answer:nswer:. copy running-config startup-config C. configure memory D. copy running-confignvram Question 6: Which command will save an active configuration? A. config t

B. config memory C. copy startup-config running-config Answer:nswer:. copy running-config startup-config Question 7: How does the router prompt appear when you are in global configuration mode? A. Router B. Router-config Answer:nswer:. Router(config) D. Router(config-router) Question 8: Where is the next place a router looks if it cannot find the IOS image in flash? A. RAM B. ROM Answer:nswer:. TFTP D. NVRAM Question 9: What is the function of the reload command? Answer:nswer:. It reboots the router B. It saves the new IOS to Flash memory C. It loads a new configuration file in NVRAM D. It loads a configuration file from a TFTP server Question 10: Which of the following is the correct order in which a router boots and looks fo r files? 1. Bootstrap from ROM 2. Config from NVRAM 3. Config from setup 4. Config from tftp 5. IOS from flash 6. IOS from ROM 7. IOS from tftp A. 5,7,6,1,2,4,3 B. 1,5,7,6,3,2,4 C. 1,2,5,4,3,7,6 Answer:nswer:. 1,5,7,6,2,4,3 Question 11: When setting passwords for vty 0 4, what are you setting a password for? A. Modem connections B. Line consoles Answer:nswer:. Telnet sessions D. Remote host router Question 12: What is an important function of the power-up self test (POST)? A. Causes other instructions to be loaded into memory Answer:nswer:. Executes diagnostics that verify the basic operation of router hardware C. Determines the router hardware and software components and lists them on th e console terminal D. Starts routing processes, supplies addresses for interfaces, and sets up me dia characteristics Question 13: Which password is encrypted in the configuration file by default? A. Console

B. Enable Answer:nswer:. Enable secret D. Virtual terminal Question 14: Which command is used to backup the active configuration file from a router to a network server? A. copy tftp startup-config Answer:nswer:. copy running-configtftp C. copy tftp flash D. copy NVRAM tftp Question 15: What is an important result of the configuration file loading onto a router? A. Causes other instructions to be loaded into memory B. Executes diagnostics that verify the basic operation of router hardware C. Determines the router hardware and software components and lists them on th e console terminal Answer:nswer:. Starts routing processes, supplies addresses for interfaces, an d sets up media characteristics Question 16: Where is the configuration file saved when you complete the setup process? A. RAM B. ROM Answer:nswer:. NVRAM D. TFTP Server Question 17: Once you have selected an interface to configure, which prompt would be on the s creen? A. Router(config)# B. Router(config-in)# C. Router(config-intf)# Answer:nswer:. Router(config-if)# Question 18: You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? A. banner msg Answer:nswer:. banner motd C. daily msg D. daily motd Question 19: Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? A. ESC Answer:nswer:. CTRL-C C. CTRL-ESC D. CTRL-SHIFT-6 , X Exam 7+8 Question 1: Which command is used to copy a system image to a network server? Answer:nswer:. Router#copy flash tftp B. Router#copy tftp flash C. Router(config)# copy flash tftp D. Router(config)# copy tftp flash

Question 2: Which configuration register mode is used to tell the router to boot from ROM? A. 0x---0 Answer:nswer:. 0x---1 C. 0x---2 D. 0x---3 Question 3: Which command is used to tell the router to boot from flash? A. Router#boot flash IOS_filename B. Router#boot system flash IOS_filename C. Router(config)# boot flash IOS_filename Answer:nswer:. Router(config)# boot system flash IOS_filename Question 4: Which command can be used to check the amount of system memory available? Answer:nswer:. Router#show flash B. Router#show interface C. Router#show register D. Router#show running-config Question 5: In the Cisco IOS name cpa25-cg-1, what does cg represent? A. Where the image runs B. Platform on which the image runs Answer:nswer:. Special capabilities and feature sets D. Whether the image has been compressed Question 6: Where will the router search for the IOS software if there are no boot system commands in NVRAM? A. ROM B. RAM Answer:nswer:. Flash D. TFTP server Question 7: Which command is used to change the default configuration register setting? A. Router#register value B. Router#config-register C. Router(config)#register value Answer:nswer:. Router(config)# config-register Question 8: Which command is used to tell the router to boot from ROM? A. Router#boot system rom B. Router#boot system rom IOS_filename Answer:nswer:. Router(config)# boot system rom D. Router(config)# boot system rom IOS_filename Question 9: Which command is used to tell the router to boot from a network server? A. Router#boot tftpIOS_filenameip address B. Router# boot system tftpIOS_filenameip address C. Router(config)# boot tftpIOS_filenameip address Answer:nswer:. Router(config)#boot system tftpIOS_filenameip address

Question 10: Which configuration register is used on a Cisco 2500 series router during password recovery? A. 0x2100 B. 0x2101 C. 0x2102 Answer:nswer:. 0x2142 Question 11: You are upgrading the IOS on a router, which command would be used to copy the new IOS image from a network server? A. Router# copy flash tftp Answer:nswer:. Router#copy tftp flash C. Router#copy startup-configtftp D. Router# copy tftp startup config Question 12: Which of the following correctly describes a method for specifying how a router loads the Cisco IOS software? Answer:nswer:. Designate fallback sources for the router to use in sequence from NVRAM. B. Configure the Cisco IOS software image for the location where it will bootstrap. C. Manually boot a default system image at a virtual terminal. D. Manually boot a default system image at the network server. Question 13: Which of the following is NOT part of the Cisco IOS naming convention? A. Where the image runs B. Platform on which the image runs C. Special capabilities and feature sets Answer:nswer:. Amount of space the file will use when copied to NVRAM Question 14: Which step should be performed before copying software between the TFTP host and Flash memory? A. Use the show Flash command to check connectivity to the server B. Check that you can see and write into RAM memory Answer:nswer:. Verify that there is sufficient room in Flash to accommodate th e IOS D. Check the configuration file name and location on the network server Question 15: In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? A. Where the image runs Answer:nswer:. Platform on which the image runs C. Special capabilities and feature sets D. Whether the image has been compressed Question 16: Where does the router search for the IOS software if the Flash is empty? A. ROM B. RAM C. NVRAM Answer:nswer:. TFTP server Question 17:

Which of the following is provided by the show version command? A. Information about the IP addresses of the interfaces B. Information about the routing protocol Answer:nswer:. Information about the system image file D. Information about the default gateway Question 18: Which command is used to discover the configuration register setting? A. show register B. show running-config Answer:nswer:. show version D. show startup-config Question 19: Which command is used to configure a routing protocol? A. Router# rip network 192.11.10.0 Answer:nswer:. Router(config)# router rip C. Router(config)# routing rip D. Router(config)#routing protocol rip Question 20: Which configuration register mode is used to tell the router to boot from NVRAM? A. 0x---0 B. 0x---1 Answer:nswer:. 0x---2 D. 0x---N Question 21: Which command can be used to check the boot field setting? Answer:nswer:. Router# show version B. Router# show register C. Router#show running-config D. Router# show startup-config Question 22: Which configuration register mode is used to tell the router to boot from ROM monitor mode? Answer:nswer:. 0x---0 B. 0x---1 C. 0x---2 D. 0x---3 Question 23: Which command is Answer:nswer:. B. Router#show C. Router#show D. Router#show Exam 9+10 Question 1: Which of the following best describes the TCP/IP protocol stack? A. Transfers information in a sequence of datagrams. Answer:nswer:. Enables communication among any set of interconnected networks. C. Maps closely to the OSI reference model in the upper layers. D. Reassembles datagrams into complete messages at the receiving location. used to view the name of the system image file? Router#show flash register running-config startup-config

Question 2: What is the purpose of ICMPs? A. They put the internetwork in control mode so that protocols can be set up. B. They are messages that the network uses to monitor connection protocols. C. They are standard binary messages that act as model internetwork protocols. Answer:nswer:. They are messages carried in IP datagrams used to send error an d control messages. Question 3: If a router has a serial interface S0, with IP address 107.85.20.2, using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? Answer:nswer:. 107.85.20.15 B. 107.85.20.255 C. 107.85.255.255 D. 107.255.255.255 Question 4: What will the source do if it is using a window size that is too large for the destination to handle and does not receive an acknowledgement from the destination? Answer:nswer:. Resend the data B. Stop sending data C. Confirm the window size with the destination D. Query the destination to see if the line is still up Question 5: If you want to turn off the name-to-address translation in the router, which command would you use? A. no ip host B. no ip address C. no ip name-search Answer:nswer:. no ip domain-lookup Question 6: If you want to specify one or more hosts that supply host name information, which command would you use? A. ip host B. ip address Answer:nswer:. ip name-server D. ip domain-lookup Question 7: In the output of show hosts , what does perm mean? A. The entry has not yet expired. B. The entry was acquired from DNS use. C. The entry was learned from DNS and now has permanent status. Answer:nswer:. The entry was manually configured in a static host table. Question 8: What provides sequencing of segments with a forward reference acknowledgment, numbers datagrams before transmission, and reassembles the segments into a complete message? A. Simple UDP acknowledgment B. Expectational acknowledgments

Answer:nswer:. TCP sequence and acknowledgment numbers D. Header checksums and data protocol checksums Question 9: Which protocol is found in the Transport Layer? A. IPX B. LLC C. RIP Answer:nswer:. UDP Question 10: What is the purpose of the protocol field? A. Allows dynamic generation of source protocols B. Changes other protocols so that they can be used by IP C. Numbers the Layer 3 protocol and makes it similar to a port number Answer:nswer:. Determines the Layer 4 protocol being carried within an IP datagram Question 11: What does the response * mean, when it comes in response to the trace command A. The network refused the trace. Answer:nswer:. Timed out waiting for trace reply. C. The destination device refused the trace. D. The source used a trace that was not supported by the network protocol. Question 12: If you want to associate a name with an IP address, such as asu 129.219.2.1, what command structure would you use? A. ip name asu 129.219.2.1 Answer:nswer:. ip host asu 129.219.2.1 C. ip host name asu 129.219.2.1 D. ip host address asu 129.219.2.1 Question 13: What best describes the function of broadcast addresses? Answer:nswer:. Used to send a message to all nodes on a network/subnet. B. Used to send a message to a single network destination. C. Used to send a message to every node the router has access to. D. Used to send a message to every router on a network in a WAN. Question 14: Which command locates path failures from the source to destination? A. ARP B. Ping Answer:nswer:. Trace D. Telnet Question 15: What is the function of ARP? A. It is used to map a known MAC address to an unknown IP address. B. It is used to develop a cached Layer 4 address resource table. Answer:nswer:. It is used to map a known IP address to an unknown MAC address. D. It sends a broadcast message looking for the router IP address

Question 16: If a device on a network does not know its Layer 3 address how can it find it?

A. ARP Answer:nswer:. RARP C. Sends an alert to the network administrator. D. Broadcasts a request to the Domain Name Server (DNS) for help. Question 17: If Host A is setting sends a segment with to send back to Host A. n B. n1 C. n + n Answer:nswer:. n + up a three-way handshake with Host B, and Host A sequence number n to Host B, what is Host B going A as an acknowledgment?

Question 18: Which of the following best describes TCP/IP? A. 7 Layer Model that enables communication among any set of interconnected networks B. Proprietary protocol that can only be used with WANs C. Proprietary protocol that can only be used with LANs Answer:nswer:. Allows communication among a variety of interconnected networks and can be used in both LANs and WANs Question 19: What is one way port numbers are used? A. Source systems generate port numbers to predict destination addresses. Answer:nswer:. To keep track of different conversations crossing the network a t the same time. C. Source systems use port numbers to keep session organized and to select the proper application. D. End systems use port numbers to dynamically assign end users to a particular session, depending on their application use. Question 20: What is the purpose of ICMP testing? Answer:nswer:. Determines if messages reach their destination B. Makes sure that all activity on the network is being monitored C. Determines if the network is in privileged mode or user mode Question 21: Which layer in the TCP/IP model includes file transfer, e-mail, remote login, and network management? Answer:nswer:. Application B. Transport C. Internet D. Network Question 22: How does the Cisco IOS software deal with name-to-address mappings? A. It does not use name-to-address mappings. B. It takes each IP address and assigns a unique name to it. C. It identifies the subnet mask being used at the destination site and routes data there. Answer:nswer:. It maintains a cache of host name-to-address mappings for use b y commands.

Question 23: A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the destination host? A. 172.16.1.0 B. 172.16.4.0 Answer:nswer:. 172.16.8.0 D. 172.16.12.0 Question 24: At which Layer of the OSI model would flow control problems exist? A. Application B. Presentation C. Session Answer:nswer:. Transport Question 25: How are IP addresses usually expressed? A. Binary code B. 4 octet subnet mask Answer:nswer:. 32-bit dotted decimal D. Transmission control protocol Exam 11 1 Which kind of route is set when the next hop is not explicitly listed in the r outing table? Dynamic Answer: Default Passive Incremental 2 How can the count to infinity problem be prevented? By using routing loops By defining a minimum hop count By increasing router memory Answer:nswer:y using hold-down timers 3 Information regarding routes has been received on a router through interface A . Which routing technique will prevent this information from exiting on the rout er through the same interface A? Dynamic routing Answer:Split horizon Static routing Hold down timers 4 How are link-state routing updates triggered? By timers Answer:nswer:y topology changes By protocol changes By changing the NIC 5 What is one disadvantage of dynamic routing? Answer:Requires lots of active network administrator management Can reveal everything known about an internetwork

Must be reconfigured if the network is changed or stations are added Cannot compensate for network failures so crashes can be a recurring problem 6 Which protocol is a link-state routing protocol? EIGRP Answer:OSPF RIP IGRP 7 Which metrics are commonly used by routers to evaluate a path? EMI load, SDLC connections, deterioration rate Answer:nswer:andwidth, load, reliability Distance, hub count, SN ratio Signal count, loss ratio, noise 8 Which routing protocol maintains a complex database of topology information an d uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 9 Which best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork When several messages are being sent to the same destination 10 Which term describes the situation where packets never reach their destinatio n but instead cycle repeatedly through the same group of network nodes? Split horizon End to end messaging Convergence Answer:Routing loop 11 Which routers exchange information when using a distance-vector routing proto col? All All in network All in subnetwork Answer:Only neighbors 12 What is one disadvantage of static routing? Requires a name server on each network Routing of data stops while routers exchange routing tables Answer:The network administrator must manually update the routing table wheneve r a topology change occurs Tends to reveal everything known about an internetwork 13 Which OSI Layer is responsible for path determination? 1

2 Answer:3 4 14 What is one advantage of dynamic routing? Takes little network overhead and reduces network overhead traffic Reduces unauthorized break-ins as security is tight Answer: Adjusts automatically to topology or traffic changes Requires very little bandwidth to operate efficiently 15 What will happen if routers have different sets of LSAs? A check sum procedure is initiated and faulty routing tables repaired. Answer:Routes become unreachable because routers disagree about a link. A comparison is forced and subsequent convergence on a single routing table occ urs. A broadcast message is sent with the master copy of the routing table to all ro uters. 16 What do distance vector algorithms require of routers? Default routes for major internetwork nodes in case of corrupted routing tables Answer:Periodically send its routing table to its neighbors Fast response times and ample memory Maintain a full database of internetwork topology information 17 What does a router use to identify the destination network (LAN) of a packet within an internetwork? MAC address Port address SPX address Answer:Network address 18 Which protocol is a hybrid routing protocol? Answer:EIGRP OSPF RIP IGRP 19 What is a network with only one path to a router called? Static network Dynamic network Entity network Answer:Stub network 20 Which part(s) of an IP address is used by the router for path determination? Answer:Network Network and client Network, subnetwork, and host Network, subnetwork, host, and subnet mask 21 Which metric measures the passage of a data packet through a router? Exchange

Answer:Hop Transmittal Signaling Exam12 1 Which command should identify destination network addresses and next hop pairs ? Router(config)# show ip protocol Router#show ip table Answer:Router> show ip route Router(config-router)# show ip table 2 Which task is configured globally? Addressing IP network numbers by specifying subnet values Answer:Selecting a routing protocol like RIP or IGRP Assigning network/subnet addresses and the appropriate subnet mask Setting up a routing metric to find the best path to each network 3 Which command specifies the directly connected networks after an IP routing pr otocol has been enabled? Router(config-if)> network network number Router(config)# network network number Answer:Router(config-router)# network network number Router(config-router)# network ip address subnet mask 4 If a new LAN is added to an internetwork, which command would add the network to the routing table? Router (config)>ip route 2.0.0.0 255.0.0.0 via 1.0.0.2 Answer:Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Router (config)# ip route 2.0.0.0 via 1.0.0.2 Router (config)# ip route 2.0.0.0 1.0.0.2 using 255.0.0.0 5 After using the router igrp command, why is it necessary to use the network su bcommand? It displays the contents of the network routing table It allows each router to send its routing table in routing updates to all the n etworks It displays the status and global parameters associated with a network Answer:It specifies any directly connected networks to be included in routing t able updates 6 Which metric is used in RIP? Bandwidth Delay Answer:Hop count Traffic load 7 Which routes are automatically determined by the routers? Static routes Default routes Answer:nswer:ynamic routes Gateway routes

8 Which type of route is used when no other routes are known to the destination? Static Answer:nswer:efault Dynamic Next available 9 How often are RIP updates broadcast? Every 15 seconds Answer:Every 30 seconds Every 60 seconds Every 90 seconds 10 What is the purpose of the ip default-network command? Answer:It is used to establish a default route It is used to save time when setting up the routing table It is used to save bandwidth when sending large datagrams It is used to keep routing table short and organized 11 What is used to measure the trustworthiness of a route? Reliability index Number of hops Answer:nswer:dministrative distance Available bandwidth 12 At which OSI Layer would an incorrect subnet mask on an interface be classifi ed? Layer 4 Answer:Layer 3 Layer 2 Layer 1 13 Which variable is used by IGRP? Answer:nswer:andwidth File size Hop length Time span 14 Which type of system occurs when routers are grouped under a common administr ation? Default Answer:nswer:utonomous Static Dynamic 15 At which Layer of the OSI model would you classify the loss of network connec tivity due to a loose patch cable? Layer 7 Layer 5 Layer 3 Answer:Layer 1

16 Which command should display RIP routing updates as they are sent and receive d? Router#show ip rip Router#debug ip protocols Answer:Router# debug ip rip Router# show ip rip update 17 What is the purpose of exterior routing protocols? To transmit between nodes on a network To deliver information within a single autonomous system Answer:To communicate between autonomous systems To set up a compatibility infrastructure between networks 18 What type of route is configured with the command: ip route 172.16.1.0 255.25 5.255.0 172.16.2.1 Answer:Static Default Dynamic Gateway 19 What is the interval of IGRP routing updates? 30 seconds 60 seconds Answer:90 seconds 120 seconds 20 At which OSI Layer would an incorrect encapsulation type on a serial interfac e be classified? Layer 4 Layer 3 Answer:Layer 2 Layer 1 21 Which mode is entered if a valid startup-configuration file is not found afte r the IOS image is loaded? Answer:Setup Static Dynamic Automatic Exam final: 1 What provides sequencing of segments with a forward reference acknowledgment, numbers datagrams before transmission, and reassembles the segments into a compl ete message? Simple UDP acknowledgment Expectational acknowledgments Answer:TCP sequence and acknowledgment numbers Header checksums and data protocol checksums 2 Which command will restart CDP if it has been disabled on the interface of a r outer?

Activate CDP Answer:nswer:DP enable Enable CDP Enable interface 3 Which statement is true of the count to infinity problem in routing loops? It is caused by the split horizon problem. It is a result of the packet's TTL value becoming too great. Only routers that use hybrid routing can overcome this problem. Answer:Routers that use hold down timers can overcome the problem. 4 What is the purpose of the IOS enable secret command? To allow the user to establish password protection on incoming Telnet sessions To allow the user to establish password protection on the console terminal To enable the user to access the User mode Answer:To enable the user to enter a password that will be encrypted 5 How are link-state routing updates triggered? By timers Answer:nswer:y topology changes By protocol changes By changing the NIC 6 Which item best describes the difference between a routed protocol versus a ro uting protocol? Routed protocols are used between routers to maintain tables while routing prot ocols are used to carry user data. Routed protocols use distance vector algorithms while routing protocols use lin k-state algorithms. Answer:Routed protocols are used to carry user data while routing protocols mai ntain tables. Routed protocols use dynamic addressing while routing protocols use static addr essing. 7 Which type of network would typically use a static route for external traffic? Fully meshed network Multihomed network Network with frequent topology changes Answer:Stub network 8 What determines how much data a receiving station running TCP/IP can accept be fore sending an acknowledgment? Protocol size Sequence numbers Transmission rate Answer:Window size 9 Which term refers to the amount of data that can be transmitted before receivi ng an acknowledgement? Answer:window size closed connection two way handshake

expectational acknowledgement 10 If a router has a serial interface S0 with IP address 107.85.20.2 using a sub net mask of 255.255.255.240, what is the broadcast address used for hosts on thi s subnet? Answer:107.85.20.15 107.85.20.255 107.85.255.255 107.255.255.255 11 Which device is normally an example of data circuit terminating equipment (DC E)? Answer:Modem Computer Router Multiplexer 12 Which command can be used to check the boot field setting? Answer:Router#show version Router#show register Router#show running-config Router# show startup-config 13 Which command is used to backup the active configuration file from a router t o a network server? copy tftp startup-config Answer:nswer:opy running-configtftp copy tftp flash copy tftp NVRAM 14 What is the function of the reload command? Answer:It reboots the router It saves the new IOS to Flash memory It loads a new configuration file in NVRAM It loads a configuration file from a TFTP server 15 Which statements are true when configuring a router to operate with RIP? At the global configuration prompt issue the command "router rip." Then set up the IP address and subnet mask on each interface. Answer:nswer:t the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly c onnected network. At the global configuration prompt issue the command "rip." Then use the "netwo rk" command to indicate which network(s) to advertise. At the global configuration prompt issue the command "enable rip routing." Then set up the IP address and subnet mask on each interface. 16 What is a typical OSI layer 2 error? Broken cable Cable connected to the wrong port Answer:Improper clock rate settings on serial interfaces Incorrect subnet mask

17 What is the first step a Cisco router performs after it is powered up? Empties contents of NVRAM Looks for the configuration file Answer:Performs a POST Starts the operating system 18 Which type of protocol controls how and when routers communicate with neighbo ring routers? Media access layer protocol Routed protocol Answer:Routing protocol Transport protocol 19 Which item best defines the ping command? Checks for connectivity at the application layer. Answer:Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Uses TTL values to generate messages from each router used along a path. Verifies the sliding window is set up properly. 20 Which configuration register mode causes a router to boot from the ROM monito r mode? Answer:0x---0 0x---1 0x---2 0x---3 21 Which metric is used in RIP? Bandwidth Delay Answer:Hop count Traffic load 22 What is exchanged to provide communication between two hosts' source and dest ination OSI peer layers? Packet datagrams Answer:Packet data units Protocol datagrams Protocol data units 23 Which router component provides working memory for configuration files and ro uting tables? Answer:RAM ROM Flash NVRAM 24 Which listing BEST describes commands that can be used to test a network? Show ip route, Show ip route, Show ip route, Answer:Show ip show interfaces, debug, telnet, network test, ping show interfaces, trace, ping, display network, debug debug, trace, ping, telnet, show ip trace route, show interfaces, debug, trace, ping, telnet

25 How can a router learn a path to a destination? ARP tables DNS entries Answer:nswer:ynamic routing Temporary routing 26 Which routing protocol maintains a complex database of topology information a nd uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 27 Which statement is true concerning port addressing? TCP ports 0-255 are for private applications TCP ports above 1023 are for marketable applications Answer:UDP ports 0-255 are for public applications UDP ports 256-1023 are unregulated 28 Which level of Cisco IOS allows only view status? Answer:User mode Enable mode Privileged mode Global configuration mode 29 What is an example of a global parameter? IP address Network number Answer:Router host name Subnet mask 30 If a new LAN is added to an internetwork, which command would add the network to the routing table? Router (config)>ip route 2.0.0.0 255.0.0.0 via 1.0.0.2 Answer:Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Router (config)# ip route 2.0.0.0 via 1.0.0.2 Router (config)# ip route 2.0.0.0 1.0.0.2 using 255.0.0.0 31 Which command is used to configure a routing protocol? Router#rip network 192.11.10.0 Answer:Router(config)# router rip Router(config)# routing rip Router(config)# routing protocol rip 32 Which command will display statistics for all interfaces configured on the ro uter? List interfaces Answer:Show interfaces Show processes Show statistics

33 What is used by a routing protocol to determine the best path to include in t he routing table? Convergence time Default distance Answer:Metric Type of router 34 A router received a packet with a destination address of 172.16.14.228. Assum ing a subnet mask of 255.255.248.0, what is the subnet network address for the d estination host? 172.16.1.0 172.16.4.0 Answer:172.16.8.0 172.16.12.0 35 Where does a router search for an IOS image if none is found in flash? RAM ROM Answer:TFTP NVRAM 36 What is used by distance-vector routing protocols? A topological database Link-state advertisements Answer:Periodic updates of entire routing table Shortest path first algorithms 37 Which layer of the TCP/IP model corresponds to the OSI network layer? Application Answer:Internet Network Interface Transport 38 Which two layers of the OSI model are described by WAN standards? Application Layer, Physical Layer Answer:nswer:ata Link Layer, Physical Layer Data Link Layer, Transport Layer Physical Layer, Network Layer 39 From the following list, what is the correct order of data encapsulation? 1. Segments2. Bits3. Packets4. Frames Answer:1-3-4-2 2-1-3-4 2-3-4-1 3-1-2-4 40 Which condition best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork When several messages are being sent to the same destination

41 What is the result of executing the erase startup-config command? It deletes the active configuration file from RAM. Answer:It deletes the backup configuration file in NVRAM. It deletes the saved configuration file from ROM. It deletes the saved configuration file from the C:\ drive. 42 Which name is given to a group of routers under a common administration that present a consistent view of routing to the external world? Answer:nswer:utonomous system Corporate system Domain name system Interior network system 43 Which Cisco IOS command displays routing table entries? ping trace Answer:show ip route show interface 44 What is a characteristic of IGRP? It is a link state routing protocol. Routing updates are broadcast every 30 seconds. The maximum hop count is 15. Answer:The metric for path selection is a composite metric using bandwidth and delay. 45 When sending data to a host on a different network, which address does the so urce host encapsulate in the IP header? IP address of the router MAC address of the router MAC address of the destination device Answer:IP address of the destination host 46 Which command causes a router to boot from ROM? Router#boot system rom Router#boot system rom IOS_filename Answer:Router(config)# boot system rom Router(config)# boot system rom IOS_filename 47 Which metrics are commonly used by routers to evaluate a path? EMI load, SDLC connections, deterioration rate Answer:nswer:andwidth, load, reliability Distance, hub count, SN ratio Signal count, loss ratio, noise 48 Which command is used to download a new system image file from a TFTP server to a router? Copy flash tftp Copy nvramtftp Answer:nswer:opy tftp flash Copy tftpnvram

49 Which keys are pressed in the escape sequence to terminate the initial config uration while in setup mode? ESC Answer:nswer:TRL-C CTRL-ESC CTRL-SHIFT-6 , X 50 How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? 18 19 Answer:20 21 51 Which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? Layer 4 Layer 3 Answer:Layer 2 Layer 1 52 Which command is used to turn off the name-to-address translation in a router ? no ip host no ip address no ip name-search Answer:Answer:no ip domain-lookup 53 Which representations have the same meaning when representing the subnet mask ? /10 and 255.224.0.0 /15 and 255.255.0.0 Answer:/21 and 255.255.248.0 /24 and 255.255.0.0 Book3 Chapter 2 1. What will be generated when the first Ethernet station detects a collision? NACK CRC misalignment message Reset broadcast Answer:Jam signal 2. Which switch type provides connections between ports of like bandwidth? Asymmetric Port-centric Programmable Answer:Symmetric 3. Which area of memory does the switch use to store destination and transmissio n data? Storage partition Delay queue

Answer:Memory buffer Memory queue 4. Full duplex requires how many pairs of wires? 1 Answer:2 3 4 5. What is read by a switch to begin the forwarding process and reduce latency? Frame trailer Answer:Destination MAC address Source MAC address Checksum 6. Switches on a LAN allow the network administrator to do which of the followin g? Maintain a shared network segment Decrease the number of collision domains Prevent microsegmentation Answer:Increase the number of collision domains 7. What occurs each time a switch stores an address? Checks the subnet mask Answer:Time stamps it Places it in the routing table Clears the routing table 8. Which OSI layer does a router use to make its forwarding decisions? 1 2 Answer:3 4 9. The implementation of switching technology helps to decrease congestion by re ducing traffic and increasing which of the following? Attenuation Answer:Available bandwidth Routing protocols Propagation 10. How do VLANs group network devices? Physically Answer:Logically Geographically Topographically 11. What protocol is used to allow redundant paths in a switched/bridged network ? RIP Answer:Spanning Tree IGRP ISL 12. What type of switching method is used when a switch only reads the destinati on address before forwarding the frame? Answer:Cut-through Read and send Copy and send

Store-and-forward 13. A LAN switch allows many users to communicate in parallel through which of t he following? Routing tables Multipoint protocols Collision domains Answer:Virtual circuits 14. Switches that receive the entire frame before sending it, use what type of f rame forwarding? Cut-through Receive and send Copy and send Answer:Store-and-forward 15. Which Layer 1 device is used to extend the coverage area of a LAN segment? Router Switch Answer:Repeater Gateway 16. Which of the following is the default order of Spanning Tree Protocol states ? 1. Learning 2. Disabled 3. Blocking 4. Listening 5. Forwarding Answer: 3, 4, 1, 5, 2 4, 3, 1, 2, 5 2, 1, 4, 3, 5 1, 4, 3, 5, 2 17. Which of the following improves the performance of a shared media LAN? Answer:Segmenting the network Moving the workstations closer together Installing a more powerful server Installing more servers and printers 18. What is used to alleviate congestion? Install more hubs Use an extended star Use a bus topology Answer:Increase the bandwidth 19. Bridges learn about a network by building a table based on which of the foll owing? Answer:MAC addresses IP addresses ARP requests RIP requests 20. What percentage of bandwidth is available in each direction when using fullduplex? 50% 75% Answer:100% 125%

21 Which of the following does a switch use to make forwarding decisions? Network layer information Transport layer information Answer:A MAC address An IP address Chapter 3 1. Users may be reassigned to different VLANs using which of the following? Hubs Answer:Software Routers Bridges 2. Which device is used to reduce or eliminate broadcast related problems? Bridges Answer:Routers Passive hubs Active hubs 3. According to the IEEE, what is the acceptable way to implement VLANs? Grouping Filtering Source bridging Answer:Frame tagging 4. A VLAN makes up a switched network that is logically segmented by all of the following EXCEPT: Answer:Collison domains Functions Applications Project teams 5. What is the term used when switch ports are automatically assigned to a VLAN? Answer:Dynamic Static Port-centric Default 6. What is a VLAN used to create? Autonomous systems Answer:Broadcast domains Network Sectors Virtual sections 7. What is an effective preventative measure used with segmentation to prevent b roadcast related problems? Answer:Firewalls LANs WANs Bridges 8. What would be the preferred type of link of a VLAN backbone? slow serial low capacity 56 Kbps Answer:High bandwidth

9. What is the term used when ports on a switch are administratively assigned to a VLAN? Answer:Dynamic Static Default Polled 10. A VLAN is based on which type of grouping? Answer:Logical Physical Star Ethernet 11. How can access be controlled on a secured VLAN? Station address Protocol types Application types Answer:All of the above 12. Which technique examines particular information about each frame? Latency Frame resolving Answer:Frame filtering Store and forward 13. Dynamic VLANs can be based on which of the following? MAC addresses Protocol type Logical addressing Answer:All of the above 14. Frame tagging functions at what OSI layer? Answer:2 3 1 4 15. Which of the following do VLANs use to make filtering and forwarding decisio ns? Packets Answer:Frames Presentation header Network design 16. The smaller the VLAN, the smaller the number of users that are affected by w hich of the following? Packet filtering Switch latency Framing Answer:Broadcasts 17. What technique does 802.1q use to implement VLANs? Grouping Filtering Source bridging Answer:Frame tagging 18. What is a benefit of using VLANs? Extended collision domains Increased administration

Multiple cable runs Answer:Tighter network security 19. When logically segmenting your network with VLANs, what type of device do yo u need to ensure proper communication between the VLANs that are created? Switch Bridge Hub Answer:Router 20. Which of the following VLAN types require changes by the network administrat or but are easy to configure, and straightforward to monitor? Dynamic Answer:Static Cut-through Store-and-forward 21. Frame tagging places a unique identifier in the header of each frame as it i s forwarded across the network __________. microsegment LAN Answer:backbone WAN Chapter 4 1. Which of the following results in network microsegmentation? Using only hubs for connectivity Removing bridges from the network Answer:Using switches for connectivity Adding more computers on a single segment 2. Which of the following devices establishes a bandwidth domain also known as t he collision domain? Repeater Answer:Switch Active hub Passive hub 3. The star/extended star topology uses what type of standard? Token ring Answer:Ethernet 802.3 Ethernet 802.5 ARCNET 4. What is the ability to expand the network without having to perform any major changes to the overall design? Functionality Manageability Operability Answer:Scalability 5. Which of the following is NOT a factor when configuring an intranet? Type of data to be accessed Server privileges Answer:Providing public access Outfitting desktops with faster connectivity 6. Where should workgroup servers be placed? MDF

POP VCC Answer:IDF 7. Internetwork design seeks to provide the greatest availability for the least _________. design time Answer:cost network downtime installation time 8. Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer:Develop LAN topology Track information flow List applications in use Address performance issues 9. Which of the following is NOT true about logical and physical network maps? Give a snapshot of the network Help troubleshoot Answer:Show which routing protocol is used Show subnet mask and router name 10. Which device is one of the most common Layer 2 devices? Answer:LAN switch Active hub Passive hub Router 11. Which of the following results from the use of bridges and switches for segm entation? Multiple broadcast domains A single collision domain A larger overall network Answer:Multiple collision domains 12. What is the most important Layer 1 issue to consider when designing a networ k? VLAN layout Answer:Physical cable plan Router layout Switch segmentation 13. What is the current standard for the bandwidth connecting MDF to IDF in Mbps ? 1 10 Answer:100 150 14. What is the first step in LAN design? Answer:Establish the design goals Estimate the design cost Determine the network users Determine the physical size 15. In a pure LAN switch environment, what is the size of the collision domain? All hosts Four hosts

Answer:Two hosts The number of hosts in the broadcast domain 16. What can routers provide when used between VLANs? Answer:Communication No services Larger collision domains Additional availability of MAC addresses 17. Which of the following is allowed by asymmetric switching? Shared switching on a segment Answer:Connections of unlike bandwidth Dedicated uplink connectivity Like bandwidth connections 18. What do VLANs provide? Physical networks Larger broadcast domains Decreased security Answer:Broadcast containment 19. Which of the following devices is associated with one broadcast domain per p ort? Switch Active hub Answer:Router Bridge 20. What type of network segmentation do routers allow? Logical and Incremental Answer:Logical and Physical Virtual and Physical Virtual and Logical 21. When creating multiple wiring closets in a totally switched environment, wha t else is always created? Answer:Multiple catchment areas Multiple broadcast domains Multiple MDFs Multiple LANs 22. What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? 3 m Answer:6 m 9 m 10 m 23. What is the effect of a switch on bandwidth? Answer:Dedicates bandwidth Shares bandwidth Decreases bandwidth Eliminates bandwidth 24. What is used to create multiple physical networks in a structured Layer 1 wi ring scheme? Answer:Patching the horizontal and vertical cabling into an appropiate layer 2 switch Using a router Connecting the MDF to the IDF

Patching fiber optic cable to coaxial cable Chapter 5 1.Which OSI layer is responsible for finding the best path through the internetw ork? 1 2 Answer:3 4 2.What is a router's main responsibility when routing packets? Traffic control Collision avoidance Enforcing security Answer:Path determination 3.What do routers use to make forwarding decisions? Answer:Routing tables VLANs WAN connectivity Proximity 4. Which of the following refers to the number of routers a packet must pass thr ough? Bandwidth Answer:Hop count Tick count Delay 5. What two parts can most protocol addressing schemes be broken down into? TCP and IP IPX and SPX Network and broadcast Answer:Network and host 6.What allows a router to accept a packet on one interface and forward it to ano ther interface? Broadcast forwarding Answer:Switching function Filter and control function Path determination 7. What do routers use to communicate with other routers? Broadcast forwarding IP Tunneling Answer:Routing protocols Routed protocols 8. Entries made by an administrator to manipulate a routing table are referred t o as which of the following? Answer:Static routes Dynamic routes ARP tables

Routing tables 9. Distance-vector routing begins by identifying which directly connected entity ? Routers Ports Switches Answer:Networks 10. Which routing protocol is used to communicate between autonomous systems? RIP Ethernet Token Ring Answer:Exterior routing protocols 11. 1. 2. 3. 4. 5. Which of the following are primary goals of routing protocols? Point-to-multipoint routing Rapid convergence Efficiency Flexibility Microsegmentation

1, 2, 3 Answer:2, 3, 4 3, 4, 5 1, 3, 5 12. What causes routing loops? Path determination is optimized Hop count is set below 50 Convergence is present Answer:Routing tables have not converged 13. What type of information is automatically adjusted as topology changes occur ? Static routes Answer: Dynamic routes ARP tables RARP tables 14. What does dynamic routing rely on? Maintenance of an ARP table Accurate entry of static routes Answer:Accurate routing tables Collision forwarding 15. For dynamic routing to work properly what must routers send to other routers ? ARP requests RARP packets Static routes Answer:Timely updates

16. Which of the following is another term for shortest path first routing algor ithm? Source bridging Store-and-forward Distance-vector Answer:Link state 17. Which of the options below gives two basic steps required when configuring a routing protocol? 1. Configure the interface 2. Enable the routing protocol 3. Disable routing updates 4. Add the network numbers 1, 2 2, 3 Answer:2, 4 3, 4 18 . What passes periodic copies of routing tables from router to router? Link state Answer:Distance vector Store-and-forward Cut-through 19. Which of the following is a Cisco proprietary protocol? Answer:IGRP RIP OSPF ISIS 20. Routers under a common administration are said to belong to what? A WAN A LAN Answer:An AS An SNMP 21. Select the correct IOS command for configuring IGRP as the routing protocol. RouterAnswer:routerigrp 100 Router(config-router)>router igrp 100 Answer:Router(config)Answer:router igrp 100 Router(config-if)Answer:set router igrp 100 22.At what time interval does IGRP send routing updates? 120 seconds 30 seconds 60 seconds Answer:90 seconds 23. What is the maximum hop count associated with IGRP? 15 50 100

Answer:255 Chapter 6: ACLs 1. Which of the following must be configured on a router in order to deny packet s based on specific tests? Answer:Access lists RIP IGRP Source routing 2. When using a standard access list, which of the following criteria can router s use for filtering packets? MAC address Port numbers Specific protocols Answer:Source address 3. Which type of access list uses the number range 100-199? IPX standard AppleTalk IP standard Answer:IP extended 4. A wildcard mask bit of "1" means that the corresponding bit must be _________ __. checked Answer:ignored deleted passed 5. Which order are the statements in an access list processed to determine wheth er packets should be processed or discarded? From bottom of the list up In random order By prioritizing the incoming packets Answer:In sequential order 6. What happens to a packet that does not match any of the tests in an access li st? Answer:It is discarded. It is sent to the recipient. It is stored until the access list is updated. It is returned to the sender. 7. What is the final step in implementing an access list? Answer:Apply the access list to one or more interfaces. Set the parameters for the access list tests. Determine the state of the access list. None of the above 8. What type of access list would you use to permit or deny specific protocols w

ithin the IP suite? Answer:Extended Protocol suite Specific Standard 9. IP access lists use which of the following to determine which address bits ar e examined? Subnet masks Network masks Host IDs Answer:Wildcard bits 10. Which wildcard mask would match the host range for the subnet 192.16.5.32 /2 7? 0.0.0.32 0.0.0.63 0.0.63.255 Answer:0.0.0.31 11. What would the wildcard mask be to deny traffic only on network 195.67.52.0? 0.0.255.255 255.255.255.0 Answer:0.0.0.255 255.255.0.0 12. In an access list, what word can replace 0.0.0.0 255.255.255.255? Permit Accept Answer:Any All 13. Which type of access list would permit or deny part of a protocol suite? Standard General Specific Answer:Extended 14. Which command is used to keep track of how many packets were permitted or de nied based on an access-list? eq establish ack Answer:log 15. Along with the packet type, Cisco IOS access lists also check what? Physical layer headers Answer:Upper layer headers Lower layer headers Data link headers 16. What is a possible use of ACLs? Increased network traffic

Decreased security Answer:Packet filtering Decreased latency 17. Which port number is used for DNS? 21 33 52 Answer:53 18. Which ACL would permit everyone to telnet to router 192.168.5.2? router-a(config)Answer:access-list 102 permit ip any host 192.168.5.2 eq 23 router-aAnswer:access-list 102 permit ip any host 192.168.5.2 eq 23 Answer:router-a(config)Answer:access-list 102 permit tcp any host 192.168.5.2 e q 23 router-aAnswer:access-list 102 permit tcp any host 192.168.5.2 eq 23 19. Where should standard access lists be set? Close to the source Answer:Close to the destination On any router in the network Midway between source and destination 20. Access lists can be applied to traffic flowing in which direction? Inbound only Answer:Both inbound and outbound Outbound only Serial only 21. Which Cisco IOS command allows you to view the placement of an access list? show access list show access-group Answer:show ip interface show interface Chapter 7: Novell IPX 1. How do you obtain an IPX network address? Apply to InterNIC Use DHCP Add the address with the subnet mask Answer:Obtain it from the network administrator 2. Which frame types are compatible with the Cisco IOS name Novell-ether? Ethernet_II Ethernet_802.2 Ethernet_SNAP Answer:Ethernet_802.3 3. Which command is used to display IPX routing tables? show ipx servers Answer:show ipx route

show ipx traffic show ipx interface 4. When using multiple encapsulations on an interface, what must be assigned? Multiple protocols Answer:Multiple network numbers Multiple subnet masks Multiple SAP types 5. Which of the following commands enables IPX routing? ipx maximum-paths Answer:ipx routing ipx network router novell-rip 6. What is the encapsulation type on a router for a Novell network running versi on 3.12? Novell-ether ARPA SNAP Answer:SAP 7. What do NetWare clients use to find NetWare servers? GNS packets Answer:SAP packets RIP packets SPX packets 8. What do routers do with SAP packets? Answer:Build a SAP table Discard the SAP packets Forward the SAP packets Send them to a SAP server 9. Where does the response to a GNS request come from if there is both a Cisco r outer and a NetWare server on the same LAN? Router Answer:Local NetWare server Local SAP server Switch 10. When configuring interfaces for IPX, what must be assigned to each interface ? IP address Host address Answer:Network number Subnet mask 11. What is the default WAN tick metric for IPX networks? Five Answer:Six Seven Eight

12. Which Cisco IOS command is used to check IPXSAP updates? show sap routing updates show sap routing activity Answer:debug ipx sap activity debug sap routing activity 13. Which configuration command is used to set the number of routes used for loa d sharing? ipx routing ipx networks Answer:ipx maximum-paths router rip 14. Where are SAP tables stored? On workstations and servers Answer:On routers and servers On routers and workstations On routers only 15. What type of protocol is IPX? Connection-oriented Answer:Connectionless Nonroutable Connection like 16. Why would you use the command IPX maximum-paths? To define the maximum hops To specify the number of routes available Answer:To provide load sharing To increase the tick count 17. What does IPX use in the host portion of an address to eliminate the use of ARP requests? SAP SPX Answer:MAC RARPs 18. What is correct regarding the node number using Novell's IPX addressing sche me? 80 bits long Written in decimal Answer:Same as the MAC address Number assigned by an administrator 19. Select the command that you would use to check IPX routing updates. show ipx routing updates show ipx routing activity Answer:debug ipx routing activity debug ipx rip 20. Which of the following occurs when a router running Novell RIP has two equal paths to a network?

Selects the route with the lowest hop count. Discards the packet. Forwards the packet out the default route. Answer:Implements load sharing. 21. Which metrics does Novell RIP use? Bandwidth and delay Answer:Ticks and hop count Distance and cost Size and throughput 22. What is the default type of routing protocol used by Novell NetWare? Link-state Answer:Distance vector Hybrid OSPF 23. Which IPX routing command is used to show the number and type of packets rec eived and transmitted by the router? show ipx servers show ipx route Answer:show ipx traffic show ipx interface Chapter 8: Network management 1. A peer-to-peer network is also known as what type of network? Client-server Thin client Answer:Workgroup Home office 2. Which of the following redundancy techniques uses disk striping with parity a nd requires a minimum of three disks? RAID 0 RAID 1 RAID 4 Answer:RAID 5 3. Which of the following would NOT be found on security documentation? User rights Firewall support Answer:Software listings Physical access to the network 4. Which command will test the loopback function on the NIC? Answer:Ping 127.0.0.1 Telnet 127.0.0.1 Ping 127.0.0.0 Telnet 127.0.0.0 5. Which device controls voltage spikes and HF noise? Surge Suppressor Answer:Isolating transformer Regulator Wall outlet

6. Which of the following is NOT associated with a peer-to-peer network? Easily shared resources No additional software is required Requires a dedicated server Less expensive to create 7. Which of the following is used to keep a list of equipment repairs? Security record Software record Answer:Maintenance record Policy record 8. Which of the following reports would be used to determine what programs are i nstalled on a particular computer? Answer:Software Server Network Workstation 9. Which of the following is the most critical component of good network adminis tration? Security Performance Answer:Documentation Backbone 10. What is the least implemented component of network administration? Security Performance Answer:Documentation Baselining 11. What is a solution to the problem of EMI/RFI effecting performance on your n etwork? Running cable along power lines Answer:Using STP cable Using fluorescent lighting Use generators to power switches in MDF 12. What is the reason magnetic tape is used to backup data? Speed Easily locate data Answer:Cost Tape never needs replacing 13. Which of the following is a program that spreads across computers and usuall y reproduces copies of itself in a computer's memory? CRC error SAP updates Answer:Worm BDU's 14. Which of the following is NOT used as a baseline measure? Bandwidth utilization Collision count Broadcast traffic Answer:Configuration errors 15. Network troubleshooting is defined as what type of process?

An applied science Answer:A systematic process A skill An applied theory

16. Which of the following is a program that usually has a negative effect on ex ecutable programs? Trojan Horse Answer:Virus Worm Infection 17. What criteria should be used to select network passwords? Specific family names Birth dates Mother's maiden name Answer:Network policy 18. What controls the resources and management of a client-server network? Server Answer:Network operating system (NOS) Host Client 19. Which of the following is included in MDF and IDF documentation? POP specifications Answer:Rack mount locations Name of administrator Server cost 20. Which of the following refers to documentation that outlines what is and wha t is not permissible on the network? Answer:User policies Internet guidelines Group restrictions Workstation permissions 21. Risks associated with working on the inside of a computer can be reduced by doing which of the following? Answer:Using a grounding strap Standing on synthetic carpet Turning the power on Wearing leather shoes 22. What is the recommended maximum number of users in a peer-to-peer network? 5 Answer:10 15 20 Mixed Final Exam of the book 3 1. How is communication provided between VLANs? Application protocols Layer 2 routing Layer 2 switching Answer:Layer 3 routing

2. The star/extended star topology uses which standard? Token ring Answer:Ethernet 802.3 Ethernet 802.5 ARCNET 3. Which configuration command is used to set the number of routes used for load sharing? ipx routing ipx networks Answer:ipx maximum-paths router rip 4. Which type of back up operation backs up all files on the disk and sets the a rchive bit on all files to off? Daily backup Differential backup Answer:Full backup Incremental backup 5. What happens to a packet that does not match any of the tests in an access li st? Answer:It is discarded. It is sent to the recipient. It is stored until the access list is updated. It is returned to the sender. 6. A wildcard mask bit of "0" means that the corresponding bit must be _________ . Answer:matched ignored deleted passed 7. Select the correct pairing of a Spanning Tree Protocol state with its functio nal description: Blocking - no frames forwarded, learning addresses Forwarding - no frames forwarded, BPDUs heard Learning - no frames forwarded, no BPDUs heard Answer:Listening - no frames forwarded, listening for frames 8. Which routing protocol maintains a complex database of topology information a nd uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 9. How can a router learn a path to a destination? ARP tables DNS entries

Answer:Dynamic routing Temporary routing 10. In an access list, which word can replace 0.0.0.0 255.255.255.255? Permit Accept Answer:Any All 11. What is used by distance-vector routing protocols? A topological database Link-state advertisements Answer:Periodic updates of entire routing table Shortest path first algorithms 12. What do routers use to forward packets between source and destination networ ks? ARP cache CAM table Host name table Answer:Routing table 13. What do routers use to maintain tables? Broadcast forwarding IP Tunneling Routed protocols Answer:Routing protocols 14. Which statements are true when configuring a router to operate with RIP? At the global configuration prompt issue the command "router rip." Then set up t he IP address and subnet mask on each interface. Answer:At the global configuration prompt issue the command "router rip." Then i ssue the "network" command at the config router prompt for each directly connect ed network. At the global configuration prompt issue the command "rip." Then use the "networ k" command to indicate which network(s) to advertise. At the global configuration prompt issue the command "enable rip routing." Then set up the IP address and subnet mask on each interface. 15. Select the prompt which will be displayed after issuing the router igrp 100 command. RouterAnswer: Answer:Router(config)Answer: Router(config-igrp)Answer: Router(config-router)Answer: 16. Switches that receive the entire frame before sending it, use which type of frame forwarding? Cut-through Receive and send Copy and send Answer:Store-and-forward

17. Which frame type is the default for Novell version 2 through 3.11? Ethernet_802.2 Answer:Ethernet_802.3 Ethernet_II Ethernet_SNAP 18. Which type of ACL only checks the source address? Extended ACL General ACL Source ACL Answer:Standard ACL 19. Which of the following imposes boundaries on broadcast traffic? Bridge Repeater Answer:Router Transceiver 20. Which IPX routing command is used to show the number and type of packets rec eived and transmitted by the router? show ipx servers show ipx route Answer:show ipx traffic show ipx interface 21. What allows a router to accept a packet on one interface and forward it to a nother interface? Broadcast forwarding Answer:Switching function Filter and control function Path determination 22. All of the following statements about VLANs are true EXCEPT: They are logical groupings of devices. Users can be grouped by function. VLANs are configured by software. Answer:VLANs are standardized. 23. Which of the following devices establishes a bandwidth domain also known as the collision domain? Repeater Answer:Switch Active hub Passive hub 24. At which layers of the OSI model do VLANs operate? Application and Presentation Answer:Data Link and Network Physical and Transport Physical and Data Link

25. Where should ACLs be applied if they are intended to provide security for th e network? Answer:On border routers On external routers On internal routers On output routers 26. In which type of VLAN are all of the nodes connected to ports in the same VL AN assigned the same VLAN ID? Default Dynamic Answer:Port centric Static 27. How is a frame tagged on a VLAN? With an application ID With a MAC address With a port ID Answer:With a VLAN ID 28. What is another term for latency? Backoff algorithm Hold-down timer Answer:Propagation delay Redundancy 29. What does the split horizon rule help prevent? Static routes Answer:Routing loops Dynamic routes Large ARP tables 30. Before a router forwards a packet, which address does it change? Destination IP address Answer:Destination MAC address Next-hop IP address Source IP address 31. What is a benefit of using VLANs? Extended collision domains Increased administration Multiple cable runs Answer:Tighter network security 32. A switch segments a LAN into which of the following? Answer:Microsegments Workgroups Broadcast domains Access groups 33. Twenty users are evenly connected to two hubs, which are each connected to 1 0 Mbps switch ports. What is the average bandwidth available per user?

0.5 Mbps Answer:1 Mbps 2 Mbps 10 Mbps 34. Which of the following is the correct command to delete an access list? Router(config)# delete access list list-number Answer:Router(config)# no access-list list-number Router(config-if)# delete access-list list-number Router(config-if)# no access list list-number 35. Which of the following is true regarding routing metrics? All routing protocols use the same metrics. IGRP uses bandwidth as its only metric. Answer:Routers compare metrics to determine the best route. The larger metric generally represents the better path. 36. What is the recommended maximum number of users in a peer-to-peer network? 5 Answer:10 15 20 37. Which protocol is used to allow redundant paths in a switched/bridged networ k? RIP Answer:Spanning Tree IGRP ISL 38. What is the effect of a switch on bandwidth? Answer:Dedicates bandwidth Shares bandwidth Decreases bandwidth Eliminates bandwidth 39. What is the encapsulation type on a router for a Novell network running vers ion 3.12? Novell-ether ARPA SNAP Answer:SAP 40. Identify the correct pairing of a protocol and its classification. BGP-Interior IGRP-Exterior OSPF-Exterior Answer:RIP-Interior 41. Which of the following is a true statement regarding location of servers in a network? Enterprise and workgroup servers should both be in the IDF. Enterprise and workgroup servers should both be in the MDF.

Answer:Workgroup servers should be in the appropriate IDF, while enterprise serv ers should be in the MDF. Workgroup servers should be in the appropriate MDF, while enterprise servers sho uld be in the IDF. 42. Which device is one of the most common Layer 2 devices? Answer:LAN switch Active hub Passive hub Router 43. Which of the following RAID levels includes disk mirroring or disk duplexing ? RAID 0 Answer:RAID 1 RAID 3 RAID 5 44. Select the correct pairing of a network service with the class of server on which it is most likely to reside: Answer:DNS - enterprise E-mail - workgroup File sharing - enterprise Word processing - enterprise 45. Which of the following devices allows communication between VLANs to occur? bridge hub switch Answer:router 46. Which of the following will help alleviate congestion? The installation of more hubs The use of an extended star topology The use of bus topology Answer:An increase in bandwidth 47. Which condition best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struct ure and topology of the internetwork When several messages are being sent to the same destination 48. Entries made by an administrator to manipulate a routing table are referred to as which of the following? Answer:Static routes Dynamic routes ARP tables Routing tables 49. What does a bridge use to build its address table?

Destination IP address Destination MAC address Source IP address Answer:Source MAC address 50. Which of the following is true regarding latency? CSMA/CD requires no latency. It is also called asymmetry. It is based entirely on distance. Answer:Networking devices add to latency. 51. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps wo uld require which of the following? Answer:A faster switch port A new HCC port Additional VCC uplink connections Use of fiber-optic media 52. Which routing protocol is used to communicate between autonomous systems? RIP Ethernet Token Ring Answer:Exterior routing protocol 53. Where should extended access lists be placed? Answer:Close to the source Close to the destination On any router in the network Midway between source and destination 54. Which command verifies that a particular node is capable of responding to an IPX network request? Connect Debug Answer:Ping Show Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b

3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical 8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask 8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64 8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless 8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two

8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r. answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process. answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem? answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network

8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data. answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides? answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer . answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080 8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol 8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal?

answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true? answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch? answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks 8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer?

answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain 8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation 8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers? answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN?

answer: a. The source device encapsulates data in a frame with the MAC addre ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______ answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI? answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps 8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm 8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer? answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet

that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets? answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename 6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting? answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address?

Answer:

*A.

00-D0-56-F2-B5-12

5.9.ARP stands for __________ Answer: A. Address Resolution Protocol 5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte 14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization 17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record. alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back

bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address? Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl

y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP?

Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the

MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star 5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security 11. Which topology requires a multipoint connection? answer (d): Bus 12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices.

answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added 20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer? Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport 28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero 31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________.

Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________. Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise 49. A sine wave is ________. Answer: d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2

51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise 55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line 63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization

68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude? Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI 73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation. Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude 84. Which of the following is most affected by noise? Answer: d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps.

Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases 89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than

103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM 119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM

120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications. Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial 125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light 129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables 133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than 136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection

138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index 140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical 143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch? Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM.

Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______.

Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end 175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6 182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL 185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data 187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un

it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder 195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded 205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error?

Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are 210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control

232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation 249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______. Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band

s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP

278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer. Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame. Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC) 299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem.

Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID. Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical 311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing. Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit. Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station . Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the

332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium 336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b) 340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length. Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches. Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path

358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine 366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac

hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above 386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______. Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c) 403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er

ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP 423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? 1 Answer: c. n 425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing 427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a

link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB 451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______.

Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited 461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket 473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data

at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port 486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______. Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow.

Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP 503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. Answer: c. Scalability 506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper 507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate. 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV

509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above 511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio 513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error. Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time. Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open 522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent 523. The server program is _______ because it is always available, waiting for a client request.

Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open 527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time. Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program 535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er.

Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain 544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain to resolve its IP address? Answer: b. kenz.acct.sony.jp

551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true. 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once 555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding 561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type 562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG 563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type

565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email. Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above 568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above 575. A request message always contains _______. Answer: d. A request line and a header 576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number 577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. Answer: a. PUT

579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents 581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP 583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response 587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? Answer: c. Static 592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head

593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute 595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above 597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE 603. Which category of HTML tags allows the listing of documents? Answer: c. List 604. A program can use _______ to write a CGI program. Answer: d. Any of the above 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static 606. The server receives input from a browser through _______. Answer: b. A form

607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML 609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression 618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______. Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in

a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file. Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive 628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode 632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only 633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm 634. Before a message is encrypted, it is called _______. Answer: d. Plaintext

635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher 637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key 639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above 642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509 647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key

649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS 655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce 658. A _______ certifies the binding between a public key and its owner. Answer: c. CA 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in

tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH 668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______. Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer level. Answer: c. IPSec 673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy.

Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid 681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits 5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses. Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets

10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded? Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol? Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop? Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above. 11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol. Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP?

Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______. Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited 3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der? Answer: C) Length of header 9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence 12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application program. Answer: C) Socket 15 INCORRECT The _______ field is used to order packets of a message. Answer: A) Sequence number 16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea

17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? Answer: D. EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25 Answer: C. Centronics-50 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment?

Answer: C.

Repeater

9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment 10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? Answer: C. Coax 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer: A. Print server 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike 19. Which power condition occurs when the voltage level increases quickly and remain

s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. Answer: B. RG-58 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus 7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP 12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Answer: D. Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? Answer: B. NAS devices are less expensive.

16. used on Answer: 17. Answer:

An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500

18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Answer: B. NIC In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS?

Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network

Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash 14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention? answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS 17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server

19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM? answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash 26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use? answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet. Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address. If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos

t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time. What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination? answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs?

answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers? answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP? answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1 answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b

e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error? answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0

Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing? answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table? answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards? answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM. Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries? answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay.

When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20 Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires? answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing? answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2

Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree 003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors 004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field. answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has

come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size 009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1 016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP 020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec 021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process 022. Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control

023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet. answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____ answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors

In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8 Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011 The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______. answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium The information to be communicated in a data communications system is the ______ . answer: Message Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability

A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented _____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP Thick Ethernet can be extended to _____ meters per segment answer: 500

_____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____ answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___ _ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____ _ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th

e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called .. answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise ______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch?

Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when:

Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event

Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125

Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49

Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically.

Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71

The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)?

Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP.

Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP

Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114

connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server

Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router:

Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session .

Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to meters per segment. protocol for communication over point .

Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 . .

Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. . .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called

Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder

Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is?

Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium.

a. b. c. d. 32. Answer: 33. Answer: 34. nswer. Answer: 35. Answer:

10BASE-T 10BASE5 10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a fixed number of blocks In ___ resolution, the resolver expects the server to supply the final a recursive By default, FTP uses which ports? 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this?

Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix

13

In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th

e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder

16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix

12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____

Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP?

Answer: receiver

*A.

Use ACK to notify the sender that the packet has arrived the

In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC

Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive

. The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54

Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added

Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat

ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid)

. Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is:

Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error

is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1

In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them

. A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three

A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21

IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others

What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment?

Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response

Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization

In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL)

What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec

eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou

ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented

TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110

Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut?

answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer

Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only

Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26

How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20,

40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie

Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60

Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy.

Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing.

Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93

which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103

To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53

Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125

P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0.

Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 .

In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP protocol for communication over point .

Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 . . meters per segment.

What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. . .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181

The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses

Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit

9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye

r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are

3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical

9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number

1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type

of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization.

Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T

CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented

20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a

t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair

Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment

2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers?

Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics

11. Answer: 12. Answer:

What network device decreases collision switch Transceiver _____specifies a physical star topology central hub . Twisted-pair

Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on:

Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst

ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol.

Answer: *A.

Connection-oriented

Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits.

Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr

oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit

What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron

ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer

Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN

Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections

Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram

Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___

bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation

The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___

_____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co

ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname?

Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr

Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP?

Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control

What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP

The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available,

What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol

FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP

RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin?

answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess

1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer?

Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors.

Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31

Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous?

Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length

Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65

you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75

What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans

port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97

In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work

Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol

Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130

In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability .

Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 .

Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits meters per segment. protocol for communication over point

Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex . . . .

Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking.

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet

Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110

Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents

16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2)

Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses?

Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____.

12 :

Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is

Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process .

Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a

VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following? Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation? Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed? Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion? Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps?

Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching? Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets? Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers? Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity? Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols? Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur? Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers?

Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router? Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates? Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded? Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27? Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list? Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs? Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2?

Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address? Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing? Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates. Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network?

Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1 Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer? Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure? Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following? Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs? Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off?

Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols? Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork? Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay

What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table? Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request?

Answer: #Ping Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number Which best describes the function of the Physical Layer? answer: Provides electrical, mechanical, procedural and functional means for act ivating and maintaining links between systems. What best describes the functions of the Application Layer? answer: Defines end-to-end delivery of packets What happens after a collision has occurred on a network after the jam signal is sent? answer: All stations stop sending frames for a randomly selected time period Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? answer: Ethernet switch Why has a layered network model been developed? answer: Accelerates evolution, ensures interoperable technology and facilitates modular engineering. Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? answer: Windowing If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? answer: 14 During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? answer: Acknowledgement and retransmission Which Layer of the OSI model is concerned with the topology of a network? answer: Data Link Which network device provides internetworking and broadcast control? answer: Router Where is the Layer 2 address found on a workstation? answer: On the network interface card What are the most common LAN technologies used in networking today? answer: Ethernet, token ring, FDDI Which of the following is true about a CSMA/CD network? answer: One node's transmission traverses the entire network and is seen and che cked by every node. Which Layer of the OSI model provides data representation and code formatting? answer: Presentation Layer What correctly describes the five conversion steps of data encapsulation? answer: Data-segments-packets-frames-bits Which OSI Layer determines best path selection? answer: Network Layer Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? answer: There will be no response. Which Layer of the OSI model handles data encryption? answer: Presentation Routers make forwarding decisions based on which kind of address? answer: logical Which Cisco IOS command is used to enter privileged mode? answer: enable What is the default user-mode prompt for a Cisco router? answer: Router> What do WAN Data link protocols describe? answer: How frames are carried between systems What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? answer: It indicates the location of an error in a command string

What best describes Frame Relay? answer: Uses high quality digital facilities with no error correction Which layers of the OSI model do WAN standards describe? answer: Physical and data link Which is an example of a data circuit terminating equipment (DCE)? answer: Modem What is the prompt of a Cisco router in the priviledged mode? answer: Router# Which packet-switched service is more efficent than X.25? answer: Frame Relay If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? answer: B. ? What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? answer: The spacebar Which memory component of a router loses its content when the router is turned o ff? answer: RAM What can only be done in privileged mode on Cisco routers? answer: Change the configuration Which character is used to enter the help mode? answer: ? Which protocol does a WAN use to make path determination decisions? answer: IP Which WAN protocol supports point-to-point and multipoint configurations? answer: HDLC Which of the following WAN technologies is a Circuit-Switched Service? answer: Narrowband ISDN Which of the following WAN technologies is a Cell-Switched Service? answer: Asynchronous Transfer Mode Which of the following are stored in NVRAM? answer: Configuration Files What do the WAN Physical Layer standards describe? answer: Interface between DTE and DCE Which keystroke will recall the previous command entry on a Cisco router user in terface? answer: Up arrow Which service does a WAN provide to LANs? answer: Exchange of data packets between routers and the LANs they support In which Layer of the OSI Model do WAN routers operate? answer: Network Layer When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? answer: User mode Which Cisco IOS command shows the configuration file stored in NVRAM? answer: show startup-config Which external configuration source is used with a modem? answer: Auxiliary Port The show interface serial Cisco IOS router command can display which one of the following lines of information? answer: Serial1 is up, line protocol is up. Which router component stores configuration files even when power is off? answer: NVRAM What is the router prompt for the interface configuration mode? answer: Router(config-if)# Which protocol is used to show summary configuration information about a directl y connected Cisco router? answer: Cisco Discovery Protocol Which Cisco IOS command is used to show current telnet connections?

answer: show sessions What is the correct command to go from the user EXEC mode to the privileged EXEC mode? answer: enable Which Cisco IOS command displays routing table entries? answer: show ip route What is stored in working RAM and is constantly updated when the router is worki ng properly? answer: Routing Table When is the configuration file loaded into RAM? answer: Each time the router is initialized Which command will indicate the status of IP, IPX, and AppleTalk? answer: show protocols What is the first thing the router does when power is turned on? answer: Executes a bootstrap program Which port is used to initially configure a router? answer: Console Which response to the appropriate show command indicates an operational serial l ink? answer: Serial1 is up, line protocol is up Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? answer: RXBOOT How many Telnet sessions can a Cisco router have simultaneously? answer: 5 Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? answer: show startup-config Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which command shows the status of Ethernet, Serial, BRI, and other ports? answer: show interfaces Which router component is responsible for the power-on bootstrap sequence? answer: ROM Which command displays information about the current Cisco IOS software version running on a router? answer: show version In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? answer: Layer 2 Which Cisco IOS command displays the backup configuration file stored in NVRAM? answer: Router# show startup-config While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? answer: square brackets - example [yes] What is the first global configuration parameter set when using the setup mode? answer: host name of the router What is the function of the erase startup-config command? answer: It deletes the configuration file in NVRAM You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? answer: copy running-config startup-config Which command will save an active configuration? answer: copy running-config startup-config How does the router prompt appear when you are in global configuration mode? answer: Router(config)# Where is the next place a router looks if it cannot find the IOS image in flash? answer: TFTP What is the function of the reload command?

answer: It reboots the router Which of the following is the correct order in which a router boots and looks fo r files? answer: 1,5,7,6,2,4,3 When setting passwords for vty 0 4, what are you setting a password for? answer: Telnet sessions What is an important function of the power-up self test (POST)? answer: Executes diagnostics that verify the basic operation of router hardware Which password is encrypted in the configuration file by default? answer: Enable secret Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is an important result of the configuration file loading onto a router? answer: Starts routing processes, supplies addresses for interfaces, and sets up media characteristics Where is the configuration file saved when you complete the setup process? answer: NVRAM Once you have selected an interface to configure, which prompt would be on the s creen? answer: Router(config-if)# You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? answer: banner motd Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C Which command is used to copy a system image to a network server? answer: Router# copy flash tftp Which configuration register mode is used to tell the router to boot answer: 0x---1 Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename Which command can be used to check the amount of system memory available? answer: Router# show flash In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets Which type of addressing scheme is formed by MAC addresses? Answer: @A. flat Which address(es) appear in an IP packet's header? Answer: source and destination addresses Which of the following is a benefit of network segmentation? Answer: reduced congestion Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer: 205.255.170.205 Which octet(s) are assigned locally in a class B address? Answer: The third and fourth octets are assigned locally What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? Answer: 6 What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? Answer: subnets Which class of network addresses allows the borrowing of 15 bits to create subne ts? Answer: Class A Which part of a network layer address does the router use during path determinat ion? Answer: the network address

Which of the following represents the use of binary ones in a subnet mask? Answer: subnet and network bits How large is the network/subnet portion of a Class B license having a subnet mas k of 255.255.240.0? Answer: 20 bits How many bits are in an IP address? Answer: 32 How many total subnets can be created if four bits are borrowed from the host fi eld? Answer: 16 What is specified by the network number in an IP address? Answer: the network to which the host belongs Which of the following assists devices on the same network in determining a pack et's final destination? Answer: host ID Which of the following would be the largest possible number expressed by an 8 bi t binary number? Answer: 11111111 Which of the following best describes the address 139.219.255.255 in an unsubnet ted environment? Answer: Class B broadcast address The IP address for a router interface should be part of what? Answer: the network attached to the interface When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? Answer: IP address of the destination host What is the correct term for when routes are learned automatically? Answer: dynamic routing What do bridges and switches use to make data forwarding decisions? Answer: physical addresses Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer: router Which type of routing protocol is RIP? Answer: distance vector Router ARP tables hold information from which of the following? Answer: all networks connected to them What is the most common protocol used to transfer routing information between ro uters located on the same network? Answer: RIP In a connection-oriented system, what happens before any user data is transferre d? Answer: a connection is established between the sender and receiver What happens if a data packet reaches a router that is destined for a network wi th which that router is not directly connected? Answer: The router forwards the packet to another router that most likely contai ns information about the destination. Which of the following contains a unique network number that is used in routing? Answer: IP address Which protocol is used to dynamically assign IP addresses? Answer: DHCP Connection-oriented network processes are often referred to as what? Answer: circuit switched Which describes the changes made to a packet's IP destination address, as that p acket is passed from router to router on it's way to the destination host? Answer: The destination IP address never changes. Which protocol can find the MAC address of a computer given its IP address? Answer: ARP Why is a static route the preferred method for reaching stub networks? Answer: static routing requires less overhead

What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer: proxy ARP Which is an example of a routed protocol? Answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? Answer: transport What do routers use to exchange routing tables and share route information? Answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? Answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? Answer: IGRP In a connectionless system, which of the following is correct? Answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? Answer: IP What are the two proprietary routing protocols developed by Cisco? Answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? Answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer: the domain The Telnet application works mainly at which layers of the OSI model? Answer: application, presentation, and session Which application layer protocol supports e-mail programs? Answer: POP3 What is the language used to create web pages? Answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? Answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? Answer: IP address Which protocol is designed to download or upload files on the Internet? Answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? Answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? Answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? Answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? Answer: DNS E-mail addresses consist of which two parts? Answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? Answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page?

Answer: hyperlink What is the data-link destination address of a broadcast message? Answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? Answer: All devices look at the request and ONLY host B will reply with the MAC address Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? Answer: Session Which best describes the structure of a MAC address? Answer: 24 bit vendor code plus 24 bit serial number What is the framing method used in PPP? Answer: Byte stuffing Assume the RTT 200ms, the transmission time of a Web object 10ms, how long does it take to download that object from a Web Server to a client if using non-persi stent HTTP? Answer: 410ms FTP uses port 21 for sending ___ and port 20 for sending ____. Answer: Identification and password....Data file 1. In an IPv4 environment, what information is used by the router to forward dat a packets from one interface of a router to another? answer: destination network address source network address source MAC address well known port destination address 2. What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number answer: source and destination IP address 3. In a connectionless system, which of the following is correct? The destination is contacted before a packet is sent. answer: The destination is not contacted before a packet is sent. The destination sends an acknowledgement to the source that indicates the packet was received. The destination sends an acknowledgement to the source that requests the next pa cket to be sent. 4. Which IP packet field will prevent endless loops? type-of-service identification flags answer: time-to-live header checksum 5. Which portion of the network layer address does a router use to forward packe ts? host portion broadcast address answer: network portion gateway addres Refer to the exhibit. Using the network in the exhibit, what would be the defaul t gateway address for host A in the 192.133.219.0 network? 192.135.250.1 192.31.7.1 192.133.219.0 answer: 192.133.219.1

7. If the default gateway is configured incorrectly on the host, what is the imp act on communications? answer: The host is unable to communicate on the local network. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. The host can communicate with other hosts on remote networks, but is unable to c ommunicate with hosts on the local network. There is no impact on communications. 8. What is the purpose of a default gateway? physically connects a computer to a network provides a permanent address to a computer identifies the network to which a computer is connected identifies the logical address of a networked computer and uniquely identifies i t to the rest of the network answer: identifies the device that allows local network computers to communicate with devices on other networks 9. What type of routing uses information that is manually entered into the routi ng table? dynamic interior answer: static standard 10. When the destination network is not listed in the routing table of a Cisco r outer, what are two possible actions that the router might take? (Choose two.) The router sends an ARP request to determine the required next hop address. answer: The router discards the packet. // The router forwards the packet out th e interface indicated by the default route entry. The router forwards the packet toward the next hop indicated in the ARP table. The router forwards the packet to the interface indicated by the source address. 11. What are the key factors to consider when grouping hosts into a common netwo rk? (Choose three.) gateways answer: purpose // geographic location // ownership physical addressing software version

12. What is a component of a routing table entry? the MAC address of the interface of the router the destination Layer 4 port number the destination host address answer: the next-hop address 13. Which intermediary devices could be used to implement security between netwo rks? (Choose two.) answer: router hub switch firewall access point bridge 14. What are three common problems with a large network? (Choose three.)

too few broadcasts answer: performance degradation // security issues // host identification limited management responsibility protocol compatibility Refer to the exhibit. All devices shown in the exhibit have factory default sett ings. How many broadcast domains are represented in the topology that is shown? 3 answer: 4 5 7 8 11 16. Which three statements are true about routes and their use? (Choose three.) If no route to the destination network is found, the packet is returned to the p revious router. answer: If the destination network is directly connected, the router forwards th e packet to the destination host. // If no route exists for the destination netw ork and... //If the originating host has a default gateway configured, the packe t for... Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packe ts out the network. Using the netstat -r command, the administrator would identi fy which address as the address to which all hosts send packets that are destine d for an outside network? 10.10.10.26 127.0.0.1 answer: 10.10.10.6 10.10.10.1 Refer to the exhibit. A network administrator notices that there are too many br oadcasts on the network. What two steps can the network administrator take to re solve this problem? (Choose two.) answer: Replace S2 with a router. // Subnet the 192.168.0.0 /24 network. Place all servers on S1. Disable TCP/IP broadcasts. Disable all unused interfaces on the switches Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choos e two.) answer: 192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network. // 192.168.0.1 is the next -hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network. 10.0.0.1 is the next-hop address that is used by R1 to route a packet from the 1 92.168.12.0 network to the 10.0.0.0 network. 192.168.0.1 is the next-hop address that is used by R1 to route a packet from th e 192.168.12.0 network to the 172.16.0.0 network. 172.16.0.1 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 to the 172.16.0.0 network. 192.168.0.2 is the next-hop address that is used by R2 to route a packet from th e 172.16.0.0 network to the 192.168.12.0 network.

20. What two characteristics are commonly associated with dynamic routing protoc ols? (Choose two.) require no device configuration answer: provide routers with up-to-date routing tables // consume bandwidth to e xchange route information require less processing power than static routes require prevent manual configuration and maintenance of the routing table 21. What statement describes the purpose of a default route? A host uses a default route to transfer data to another host on the same network segment. A host uses a default route to forward data to the local switch as the next hop to all destinations. A host uses a default route to identify the Layer 2 address of an end device on the local network. answer: A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists. 1 A PC can not connect to any remote websites, ping its default gateway, or pin g a printer that is functioning properly on the local network segment. Which act ion will verify that the TCP/IP stack is functioning correctly on this PC? answer: X Use the ping 127.0.0.1 command at the command prompt. 2 Refer to the exhibit. Which set of devices contains only intermediary devices ? answer: X A, B, D, G 3 Refer to the exhibit. When computer A sends a frame to computer D, what compu ters receive the frame? answer: X only computer D 4 Which password is automatically encrypted when it is created? answer: enable secret= 5 Which three statements characterize the transport layer protocols? (Choose th ree.) answer: X TCP and UDP port numbers are used by application layer protocols.//TCP uses windowing and sequencing to provide reliable transfer of data.//TCP is a c onnection-oriented protocol. UDP is a connectionless protocol. 6 Which type of media is immune to EMI and RFI? (Choose two.) answer: 100 Base-FX//1000 Base LX 7 Refer to the exhibit. A technician is working on a network problem that requi res verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational? answer: 192.168.254.1 8 Refer to the exhibit. The diagram represents the process of sending email bet ween clients. Select the list below that correctly identifies the component or p rotocol used at each numbered stage of the diagram. answer: 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

9 Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? answer: X address translation 10 Refer to the exhibit. The network containing router B is experiencing proble ms. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue? answer: issue the no shutdown command on interface FastEthernet 0/1 11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three .) answer: X 172.16.4.63 --- 172.16.4.191 -- 172.16.4.95 12 What are three characteristics of CSMA/CD? (Choose three.) answer: A device listens and waits until the media is not busy before transmitti ng.// All of the devices on a segment see data that passes on the network medium //After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. 13 In a Cisco IOS device, where is the startup-configuration file stored? answer: NVRAM 14 A routing issue has occurred in you internetwork. Which of the following typ e of devices should be examined to isolate this error? answer: router 15 Which OSI layer protocol does IP rely on to determine whether packets have b een lost and to request retransmission? answer: transport 16 Due to a security violation, the router passwords must be changed. What info rmation can be learned from the following configuration entries? (Choose two.) answer: The entries specify four Telnet lines for remote access // Access will b e permitted for Telnet using "c13c0" as the password.

17 Which prompt represents the appropriate mode used for the copy running-confi g startup-config command ? answer: Switch-6J# 18 Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255? answer: 172.16.128.0 255.255.224.0 19 When must a router serial interface be configured with the clock rate comman d? answer: when the interface is functioning as a DCE device

20 When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the re transmission of missing data? answer: upper-layer connection-oriented protocols 21 A technician is asked to secure the privileged EXEC mode of a switch by requ iring a password. Which type of password would require this login and be conside red the most secure? answer: enable secretVTY 22 Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on RouterA? answer: a terminal emulation program 23 Refer to the exhibit. A network administrator remotely accesses the CLI of R outerB from PC1. Which two statements are true about the application layer proto col that is used to make this connection? (Choose two.) answer: X The connection type is called a VTY session.//.X The application name is the same for the service, protocol, and client. 24 The Layer 4 header contains which type of information to aid in the delivery of data? answer: X service port r 25 Refer to the exhibit. What two facts can be determined about the exhibited t opology? (Choose two.) answer: X A single broadcast domain is present -- Five collision domains exist. 26 Refer to the exhibit. A network technician is trying to determine the correc t IP address configuration for Host A. What is a valid configuration for Host A? answer: IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gatewa y: 192.168.100.17 27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific p hysical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network componen ts on that segment. From the data given, which segments have the correct cable i nstalled? (Choose three.) answer: X segment1 , 3 ,4 28 What is true regarding network layer addressing? (Choose three.) answer: heirarchical // uniquely identifies each host // contains a network port ion

29 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet? answer: The packet will be forwarded to the destination host. 30 Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.) answer: The destination port indicates a Telnet session // The return segment w ill contain a source port of 23. 31 Refer to the exhibit. What is the correct destination socket number for a we b page request from Host A to the web server? answer: 198.133.219.25:80 32 During the encapsulation process, which identifiers are added at the transpo rt layer? answer: two applications communicating the data 33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as show n. What is the result? (Choose two.) answer: The cable is suitable for use as a Fast Ethernet crossover.// The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches. 34 Refer to the exhibit. Assume all devices are using default configurations. H ow many subnets are required to address the topology that is shown? answer: 3 35 Refer to the exhibit. On the basis of the IP configuration that is shown, wh at is the reason that Host A and Host B are unable to communicate outside the lo cal network? answer: The gateway address was assigned a broadcast address. 36 Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices? Connection 1 - rollover cableConnection 2 - straight-through cableConnection 3 crossover cable Connection 1 - crossover cableConnection 2 - rollover cableConnection 3 - crosso ver cable Connection 1 - straight-through cableConnection 2 - crossover cableConnection 3 - crossover cable answer: Connection 1 - straight-through cableConnection 2 - crossover cableConn ection 3 - straight-through cable Connection 1 - crossover cableConnection 2 - straight-through cableConnection 3

- crossover cable 37 Refer to the exhibit. What does the IP address 192.168.33.2 represent? answer: The host's primary domain name server. 38 Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.) answer: The destination port indicates that an HTTP session has been initiated. // The data listed is associated with the transport layer. 39 Which of the following are the address ranges of the private IP addresses? ( Choose three.) answer: 10.0.0.0 to 10.255.255.255 // 172.16.0.0 to 172.31.255.255 // 192.168.0 .0 to 192.168.255.255 40 Which two functions of the OSI model occur at layer two? (Choose two.) answer: physical addressing// media access control 41 Which range of port numbers are reserved for services that are commonly used by applications that run on servers? answer: 0 to 1023 42 As network administrator, what is the subnet mask that allows 510 hosts give n the IP address 172.30.0.0? answer: 255.255.254.0 43 Refer to the exhibit. The tracert command is initiated from PC1 to the desti nation PC4. Which device will send a response to the initial packet from PC1? answer: London 44 Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communicatio n? answer: Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75 45 Refer to the exhibit. Which logical topology best describes the exhibited ne twork? answer: multiaccess 46 Examine the graphic with current configurations. Host A in the Clerical offi ces failed and was replaced. Although a ping to 127.0.0.1 was successful, the re placement computer can not access the company network. What is the likely cause of the problem? answer: subnet mask incorrectly entered 47 Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.) answer: 192.168.18.49//192.168.18.52//192.168.18.59 48 Refer to the exhibit. What three statements are true about the IP configurat ion that is shown? (Choose three.)

answer: The address that is assigned to the computer represents private addressi ng.// The computer is unable to communicate outside of the local network. // The prefix of the computer address is /27. 49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with hos t C. During this attempt, a frame was captured with the source MAC address 0050. 7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP addr ess is 192.168.219.24. At which point in the network was this packet captured? answer: leaving Dallas 50 Which of the following OSI layers offers reliable, connection-oriented data communication services? answer: transport 1 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which acti on will verify that the TCP/IP stack is functioning correctly on this PC? Use the ipconfig /all command at the host?s command prompt. answer: Use the ping 127.0.0.1 command at the command prompt. Use the traceroute command at the command prompt to identify any failures on the path to the gateway. Use FTP to check for connectivity to remote sites. Download a troubleshooting tool from the PC manufacturer s website. 2 Refer to the exhibit. Which set of devices contains only intermediary devices? answer: A, B, D, G A, B, E, F C, D, G, I G, H, I, J 3 Refer to the exhibit. When computer A sends a frame to computer D, what comput ers receive the frame? answer: only computer D only computer A and computer D only computer B, computer C, and computer D all computers 4 Which password is automatically encrypted when it is created? vty aux console answer: enable secret enable password 5 Which three statements characterize the transport layer protocols? (Choose thr ee.) answer: TCP and UDP port numbers are used by application layer protocols.//TCP u ses windowing and sequencing to provide reliable transfer of data.//TCP is a con nection-oriented protocol. UDP is a connectionless protocol. TCP uses port numbers to provide reliable transportation of IP packets. UDP uses windowing and acknowledgments for reliable transfer of data. -> ->

6 Which type of media is immune to EMI and RFI? (Choose two.) 10 Base-T 10 Base-2 10 Base-5 answer: 100 Base-FX // 1000 Base LX 100 Base TX -> 7 Refer to the exhibit. A technician is working on a network problem that requir es verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational? 127.0.0.1 192.168.64.196 answer: 192.168.254.1 192.168.254.9 192.168.254.254 8 Refer to the exhibit. The diagram represents the process of sending email betw een clients. Select the list below that correctly identifies the component or pr otocol used at each numbered stage of the diagram. 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA 1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA answer: 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA 9 Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? answer: address translation DHCP services ftpd web server 10 Refer to the exhibit. The network containing router B is experiencing problem s. A network associate has isolated the issue in this network to router B? What action can be preformed to correct the network issue? issue the ip address command on interface FastEthernet 0/0 answer: issue the no shutdown command on interface FastEthernet 0/1 issue the clock rate command on interface Serial 0/0/0 issue the description command on interface Serial 0/0/1 11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three. ) answer: 172.16.4.63 /26 -- 172.16.4.191 /26 -- 172.16.4.95 /27 172.16.4.129 /26 -> 172.16.4.51 /27 -> 172.16.4.221 /27 12 What are three characteristics of CSMA/CD? (Choose three.) Devices can be configured with a higher transmission priority.

A jam signal indicates that the collision has cleared and the media is not busy. answer: A device listens and waits until the media is not busy before transmitti ng. // All of the devices on a segment see data that passes on the network mediu m. //After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. The device with the electronic token is the only one that can transmit after a c ollision. -> -> 13 In a Cisco IOS device, where is the startup-configuration file stored? Flash answer: NVRAM RAM ROM 14 A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error? access point host hub answer: router switch 15 Which OSI layer protocol does IP rely on to determine whether packets have be en lost and to request retransmission? application presentation session answer: transport 16 Due to a security violation, the router passwords must be changed. What infor mation can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login The entries specify three Telnet lines for remote access. answer: The entries specify four Telnet lines for remote access. // Access will be permitted for Telnet using c13c0? as the password. The entries set the console and Telnet password to c13c0?. Telnet access will be denied because the Telnet configuration is incomplete. -> 17 Which prompt represents the appropriate mode used for the copy running-config startup-config command ? Switch-6J> answer: Switch-6J# Switch-6J(config)# Switch-6J(config-if)# Switch-6J(config-line)# 18 Which combination of network id and subnet mask correctly identifies all IP a ddresses from 172.16.128.0 through 172.16.159.255? 172.16.128.0 255.255.255.224

172.16.128.0 255.255.0.0 172.16.128.0 255.255.192.0 answer: 172.16.128.0 255.255.224.0 172.16.128.0 255.255.255.192 19 When must a router serial interface be configured with the clock rate command ? when the when the when the answer: interface is functioning as a DTE device interface timers have been cleared connected DTE device is shut down when the interface is functioning as a DCE device

20 When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the ret ransmission of missing data? connectionless acknowledgements answer: upper-layer connection-oriented protocols Network layer IP protocols Transport layer UDP protocols 21 A technician is asked to secure the privileged EXEC mode of a switch by requi ring a password. Which type of password would require this login and be consider ed the most secure? console enable answer: enable secret VTY 22 Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on RouterA? a FTP client a telnet client answer: a terminal emulation program a web browser 23 Refer to the exhibit. A network administrator remotely accesses the CLI of Ro uterB from PC1. Which two statements are true about the application layer protoc ol that is used to make this connection? (Choose two.) The data is encrypted. answer: The connection type is called a VTY session. // The application name is the same for the service, protocol, and client. A server process is running on PC1. A GET request is sent to RouterB. -> 24 The Layer 4 header contains which type of information to aid in the delivery of data? answer: service port number host logical address device physical address virtual connection identifier 25 Refer to the exhibit. What two facts can be determined about the exhibited to pology? (Choose two.)

answer: A single broadcast domain is present // Five collision domains exist. Two logical address ranges are required. Three broadcast domains are shown. Four networks are needed. -> 26 Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A? IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default 6.1.2 answer: IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; y: 192.168.100.17 IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default 68.100.18 IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default 1.5 IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default 68.1.1 IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default 68.100.18 Gateway: 192.1 Default Gatewa Gateway: 192.1 Gateway: 10.1. Gateway: 192.1 Gateway: 192.1

27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific ph ysical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network component s on that segment. From the data given, which segments have the correct cable in stalled? (Choose three.) answer: segment1 , 3 , 4 segment2 -> segment3 -> segment4 segment5 28 What is true regarding network layer addressing? (Choose three.) uses a flat structure prevent broadcasts answer: heirarchical // uniquely identifies each host // contains a network port ion -> 48 bits in length -> 29 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet? The packet will be The packet will be answer: The packet The packet will be dropped. forwarded via FastEthernet 0/0. will be forwarded to the destination host. forwarded to the 192.168.1.3 next-hop address.

30 Refer to the exhibit. Which two statements describe the information that is r epresented in the header? (Choose two.) This is a server response. The UDP protocol is being used. answer: The destination port indicates a Telnet session. // The return segment w ill contain a source port of 23. ->

The next session originated from the client of this session will use the source port number 13358. 31 Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server? answer: 198.133.219.25:80

32 During the encapsulation process, which identifiers are added at the transpor t layer? two networks routing the packets answer: two applications communicating the data two hosts at either end of the communication two nodes on the local network exchanging the frame 33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown . What is the result? (Choose two.) The cable is unusable and must be rewired. The cable is suitable for use as a Gigabit Ethernet straight-through. answer: The cable is suitable for use as a Fast Ethernet crossover. // The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches. The cable is suitable for use as a rollover cable. The cable is suitable for use as a Gigabit Ethernet crossover. -> 34 Refer to the exhibit. Assume all devices are using default configurations. Ho w many subnets are required to address the topology that is shown? 1 answer: 3 4 5 7 35 Refer to the exhibit. On the basis of the IP configuration that is shown, wha t is the reason that Host A and Host B are unable to communicate outside the loc al network? Host A was assigned a network address. Host B was assigned a multicast address. Host A and Host B belong to different networks. answer: The gateway address was assigned a broadcast address. 36 Refer to the exhibit. Each media link is labeled. What type of cable should b e used to connect the different devices? Connection 1 Connection 2 Connection 3 Connection 1 Connection 2 Connection 3 Connection 1 rollover cable straight-through cable crossover cable crossover cable rollover cable crossover cable straight-through cable

Connection 2 Connection 3

crossover cable crossover cable crossover cable //

answer: Connection 1 straight-through cable // Connection 2 Connection 3 straight-through cable

Connection 1 Connection 2 Connection 3

crossover cable straight-through cable crossover cable

37 Refer to the exhibit. What does the IP address 192.168.33.2 represent? The host s default gateway. The host s IP address. answer: The host s primary domain name server. The IP address of the website resolver1.mooki.local. The IP address of the host s homepage. 38 Refer to the exhibit. What two facts can be determined from the information t hat is given? (Choose two.) This exchange is part of the three-way handshake. The source port indicates that a Telnet session has The data is flowing from server to client. answer: The destination port indicates that an HTTP // The data listed is associated with the transport X The source port does not support communication with listed. been initiated. session has been initiated. layer. the destination port that is

39 Which of the following are the address ranges of the private IP addresses? (C hoose three.) answer: 10.0.0.0 to 10.255.255.255 -- 172.16.0.0 to 172.31.255.255 -- 192.168.0. 0 to 192.168.255.255 200.100.50.0 to 200.100.25.255 150.150.0.0 to 150.150.255.255 -> -> 127.16.0.0 to 127.31.255.255 40 Which two functions of the OSI model occur at layer two? (Choose two.) answer: physical addressing // media access control encoding routing cabling -> 41 Which range of port numbers are reserved for services that are commonly used by applications that run on servers? 0 to 255 answer: 0 to 1023 1024 to 49151 49152 to 65535 42 As network administrator, what is the subnet mask that allows 510 hosts given

the IP address 172.30.0.0? 255.255.0.0 255.255.248.0 255.255.252.0 answer: 255.255.254.0 255.255.255.0 255.255.255.128 43 Refer to the exhibit. The tracert command is initiated from PC1 to the destin ation PC4. Which device will send a response to the initial packet from PC1? answer: London Paris Athens Ankara PC4 44 Refer to the exhibit. Host A is transmitting data to host B. What addresses w ill host A use to for the destination IP and MAC addresses in this communication ? Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62 Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75 Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62 Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75 answer: Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75 Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94 45 Refer to the exhibit. Which logical topology best describes the exhibited net work? star ring point-to-point answer: multiaccess mesh 46 Examine the graphic with current configurations. Host A in the Clerical offic es failed and was replaced. Although a ping to 127.0.0.1 was successful, the rep lacement computer can not access the company network. What is the likely cause o f the problem? IP address incorrectly entered network cables unplugged answer: subnet mask incorrectly entered network card failure 47 Refer to the exhibit. With the router running NAT, what IP addresses can be a pplied to the computer to allow access to the Internet? (Choose three.) 192.168.18.38 192.168.18.48 answer: 192.168.18.49 -- 192.168.18.52 -- 192.168.18.59 -> -> 192.168.18.63 48 Refer to the exhibit. What three statements are true about the IP configurati on that is shown? (Choose three.)

answer: The address that is assigned to the computer represents private addressi ng. -- The computer is unable to communicate outside of the local network. -- Th e prefix of the computer address is /27. -> The network of this computer can have 126 hosts. -> The IP address that is assigned to the computer is routable on the Internet. The IP address that is assigned to the computer is a broadcast address. 49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7 320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the c aptured frame has an IP source address 192.168.7.5, and the destination IP addre ss is 192.168.219.24. At which point in the network was this packet captured? leaving leaving answer: leaving host A ATL leaving Dallas NYC

50 Which of the following OSI layers offers reliable, connection-oriented data c ommunication services? application presentation session answer: transport network 1. Refer to the exhibit. Host B attempts to establish a TCP/IP session with C. During this attempt, a frame was captured at the FastEthernet interface 1 of the San Francisco router. The packet inside the captured frame has the ce IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What he destination MAC address of the frame at the time of capture? answer: 0060.7320.D632 - 0060.7320.D631 - 0040.8517.44C3 - 0009.B2E4.EE03 - 0010.C2B4.3421 host fa0/ sour is t

2. What are three characteristics of CSMA/CD? (Choose three.) answer: It monitors the media for presence of a data signal.//After detecting a collision, hosts can resume transmission after a random timer has expired. //A j am signal is used to ensure that all hosts are aware that a collision has occurr ed. - Devices can be configured with a higher transmission priority. - Data is transmitted only when the data signal is present. - It uses a token system to avoid collisions. 3. Refer to the exhibit. The PC, the routing table of which is displayed, is con figured correctly. To which network device or interface does the IP address 192. 168.1.254 belong? - PC - switch answer: router interface fa 0/0 - router interface fa 0/1

4. Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A? - Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130 - Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2 answer: Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1 - Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130 5. Refer to the exhibit. Communication between hosts X and Y is restricted to th e local network. What is the reason for this? - The gateway addresses are broadcast addresses. - Host Y is assigned a multicast address. answer: Host X and host Y belong to different networks. - Host X is assigned a network address. 6. What is the result of using the clock rate 56000 command at the serial interf ace of the router? answer: The interface is configured as a DCE device. - The interface timers are cleared. - The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal. - The IP address for the serial interface is configured. 7. Which three addresses belong to the category of public IP addresses? (Choose three.) - 127.0.0.1 answer: 196.1.105.6 // 132.11.9.99 // 46.1.1.97 - 10.0.0.1 - 172.16.9.10 8. Which three statements are true about transport layer protocols? (Choose thre e.) answer: TCP and UDP manage communication between multiple applications.//TCP ack nowledges received data.//UDP uses windowing and sequencing to provide reliable transfer of data. - TCP retransmits the packets for which the acknowledgment is not received. - UDP exchanges frames between the nodes of the network. - TCP has no mechanism to acknowledge transmission errors. 9. Refer to the exhibit. Which logical topology describes the exhibited network? - star - ring answer: point-to-point - multi-access 10. Which statement is true about the running configuration file in a Cisco IOS device? answer: It affects the operation of the device immediately when modified. - It is stored in NVRAM. - It should be deleted using the erase running-config command. - It is automatically saved when the router reboots. 11. Refer unable to cause of - Hosts A to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is communicate with hosts A and B in the organization. What is the likely the problem? and B are not on the same subnet as host C.

- The IP addresses on the router serial interfaces are wrong. answer: The subnet mask on host C is improperly configured. - The FastEthernet interface fa0/0 of router 1 is wrongly configured. 12. A host is transmitting a video over the network. How does the transport laye r allow this host to use multiple applications to transmit other data at the sam e time as the video transmission? - It uses error control mechanisms. answer: It uses a connectionless protocol only for multiple simultaneous transmi ssions. - It uses multiple Layer 2 source addresses. - It uses multiple port numbers. 13. Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this prob lem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm th is? - 10.0.0.254 - 192.168.0.249 answer: 192.168.0.250 - 10.0.1.254 14. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical la yer requirements. Which three segments use Cable 2? (Choose three.) - Segment 1 answer: Segment 2 , 5 ,6 - Segment 3 - Segment 4 - Segment 5 - Segment 6 15. Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.) - Three networks are needed. answer: Two logical address ranges are required. // A single broadcast domain is present. - Three collision domains are present. - Four networks are needed. 16. Refer to the exhibit. Which three statements are true about the IP configura tion that is displayed? (Choose three.) answer: The assigned address is a private address.//The prefix of the computer a ddress is /26. - The PC cannot communicate with the DNS server. - The network can have 126 hosts. - The IP address is routable on the Internet. - The IP address is a multicast address. 17. Which password restricts Telnet access to the router? answer: enable - enable secret - console - VTY 18. Refer to the exhibit. To create the initial configuration, a network technic ian connected host A to the router using the connection that is shown. Which sta tement is true about this connection? - It terminates at the Ethernet port of the router.

answer: It provides out-of-band console access. - It terminates at the serial interface of the router. - It requires a Telnet client on host A to access the router. 19. Which device should be used for routing a packet to a remote network? - access switch - DHCP server - hub answer: router 20. Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technic ian do to solve this problem? - Configure the description at interface serial 0/0/0. answer: Configure an IP address on interface serial 0/0/0. - Remove the no shutdown command at interface serial 0/0/0 - Reboot the router. 21. Refer to the exhibit. In a network, host A is sending data segments to host B. The flow control of the segments that are being exchanged is displayed. Which two statements are true about this communication? (Choose two.) answer: The initial window size is determined via the two-way handshake.//Acknow ledgment number 3001 indicates that host A will send the next segment with seque nce number 3001. - The window size for the TCP session that is represented is initially set to 30 00 bytes. - Host B expects that the next received segment number will be 3000. - No more acknowledgments will be exchanged. 22. Refer to the exhibit. The network administrator wants to remotely access the CLI of the router from PC1 using modem 1. Which port of the router should be co nnected to modem 2 to enable this access? - console - Ethernet answer: auxiliary - serial 23. Which OSI layer uses a connection-oriented protocol to ensure reliable deliv ery of data? - application layer - presentation layer - session layer answer: transport layer 24. What are two functions of the data link layer? (Choose two.) answer: It segments and reorders the data. // It controls how data is placed ont o the media. - It exchanges data between programs that are running on the source and destinat ion hosts. - It generates signals to represent the bits in each frame. - It encapsulates each packet with a header and a trailer to transfer it across the local media. 25. Refer to the exhibit. Which list refers only to end devices? answer: D,E,F,G - A,H,B,C - A,D,E,F

- A,D,E,G 26. Refer to the exhibit. The diagram represents the process of sending e-mail b etween clients. Which list correctly identifies the component or protocol used a t each numbered stage of the diagram? - 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA - 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA - 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA answer: 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA 27. Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch? - The table will remain unaffected. answer: The switch will remove the MAC address at Fa 0/19 immediately. - The switch will retain the MAC address until host B is powered on again. - The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19. 28. Refer to the exhibit. A technician has connected the PC to the switch using a Category 6 UTP cable. Which two statements are true about this connection? (Ch oose two.) - The cable that is used is an Ethernet crossover cable. answer: The transmit pin of the cable is terminated to the receive pin. // The m aximum supported bandwidth is 1000 Mb/s. - The maximum distance between the switch and the PC can be 100 m. - The Category 6 cable simulates a point-to-point WAN link and is unusable for t his type of connection. 29. Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this connection? (Choose three.) - 10.1.1.63 answer: 10.1.1.37 -- 10.1.1.39 -- 10.1.1.60 - 10.1.1.32 - 10.1.1.2 30. Refer to the exhibit. A PC is communicating with another PC on a remote netw ork. The two networks are connected by three routers. Which action will help to identify the path between the hosts? - Use the ipconfig command at the host. - Use the ipconfig/all command at the destination. answer: Use the tracert command at the host. - Use the ping command at the destination. 31. An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this network? - 255.255.0.0 answer: 255.255.248.0 - 255.255.252.0 - 255.255.254.0 - 255.255.255.0 - 255.255.255.128 32. Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network? - IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.

31.35 - IP address: 172.16.31.63 Subnet 31.35 - IP address: 172.16.31.29 Subnet 31.35 - IP address: 172.16.31.32 Subnet 31.35 - IP address: 172.16.31.29 Subnet 30.1 answer: IP address: 172.16.31.37 172.16.31.35

mask: 255.255.255.224 Default gateway: 172.16. mask: 255.255.255.248 Default gateway: 172.16. mask: 255.255.255.224 Default gateway: 172.16. mask: 255.255.255.240 Default gateway: 172.16. Subnet mask: 255.255.255.224 Default gateway:

33. Refer to the exhibit. A technician uses the nslookup command on the PC and v iews the output that is displayed in the exhibit. What is the IP address of the primary domain name server configured at the host? (Choose two.) - 192.168.1.99 - 192.168.2.100 answer: 10.10.10.32 // 192.168.1.5 - the IP address of the website resolver1.xyz.local 34. Which OSI layer offers ordered data reconstruction services? - application layer - network layer - presentation layer - session layer answer: transport layer 35. Refer to the exhibit. All devices in the network use default configurations. How many logical address ranges are required in this topology? - 2 - 3 - 4 answer: 5 - 6 36. The network administrator wants to install a private application on a server . Which range of port numbers is normally assigned to this application to make i t accessible by clients? - 0 to 255 - 49152 to 65535 - 1024 to 4915 answer: 10 to 1023 37. Because of a security violation, the router password must be changed. What i nformation can be learned from these configuration entries? (Choose two.) Router(config)# line vty 0 4 Router(config-line)# password arj15 Router(config-line)# login - This configuration allows users to connect by using a modem. - Users must specify which line, 0 or 4, they wish to connect to when making a c onnection. answer: This configuration allows users to connect to the router via the use of the telnet command.//This configuration allows five users to make simultaneous c onnections to this router. - The configured password is automatically encrypted on the router. 38. Refer to the exhibit. Each media link is labeled. What type of cable should

be used to connect the different devices? - Connection 1 rollover cable Connection 2 straight-through cable Connection 3 c rossover cable - Connection 1 straight-through cable Connection 2 crossover cable Connection 3 rollover cable - Connection 1 crossover cable Connection 2 rollover cable Connection 3 straight -through cable - Connection 1 crossover cable Connection 2 straight-through cable Connection 3 rollover cable answer: Connection 1 straight-through cable Connection 2 straight-through cable Connection 3 straight-through cable 39. Which two types of media are useful for connecting two devices separated by a distance of 500 meters? (Choose two.) - 10 BASE-T answer: 1000 BASE-TX // 1000 BASE-SX - 10 BASE-2 - 1000 BASE LX 40. Which information is used by the router to determine the path between the so urce and destination hosts? - the host portion of the IP address answer: the network portion of the IP address - host default gateway address - the MAC address 41. Refer to the exhibit. What two facts can be determined from the session info rmation that is displayed? (Choose two.) - This exchange is part of the three-way handshake. answer: The destination port indicates that a Telnet session has been initiated. //The protocol is a connection-oriented protocol. - The source port does not support communication with the destination port that is listed. - The destination port indicates that an SMTP session has been initiated. 42. Refer to the exhibit. Host A is accessing multiple servers. Which combinatio n of port number and address will uniquely identify a particular process running on a specific server? - MAC address of the server and port number of the service - IP address of the host and port number of the service - MAC address of the host and port number of the service answer: IP address of the server and port number of the service 43. A network technician wants to configure an IP address on a router interface by using the ip address 192.168.1.0 255.255.255.0 command. Which prompt should t he technician see when entering this command? - Router> answer: Router(config-if)# - Router# - Router(config)# 44. Refer to the exhibit. Host X is unable to communicate with host Y. Which com mand can be run at host X to determine which intermediary device is responsible for this failure? - telnet 192.168.1.1 - ping 192.168.1.1 - ftp 192.168.1.1 answer: tracert 192.168.1.1

45. Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame re ceived at PC2 is shown. What information in this frame determines the correct de stination application? - timing and synchronization bits - destination and source physical addresses - destination and source logical network addresses answer: destination and source process numbers 46. An organization has been assigned network ID 10.10.128.0 and subnet mask 255 .255.224.0. Which IP address range can be used for this organization? - 10.10.128.0 to 10.10.160.255 answer: 10.10.128.0 to 10.10.159.255 - 10.10.128.0 to 10.10.192.255 - 10.10.128.0 to 10.10.0.159 - 10.10.128.0 to 10.10.159.0 47. What is the effect of using the Router# copy running-config startup-config c ommand on a router? - The contents of ROM will change. - The contents of RAM will change. answer: The contents of NVRAM will change. - The contents of flash will change. 48. Which three IPv4 addresses represent valid host addresses for a subnet? (Cho ose three.) - 10.1.12.79/28 answer: 10.1.12.113/28 -- 10.1.11.5/27 -- 10.1.11.97/27 - 10.1.12.32/28 - 10.1.11.128/27 49. Refer to the exhibit. The NAT functionality of the router is enabled to prov ide Internet access to the PC. However, the PC is still unable to access the Int ernet. Which IP address should be changed to 209.165.201.1 to enable the PC to a ccess the Internet? - 192.168.1.191 - 192.168.1.101 - 192.168.1.1 answer: 192.168.1.254 50. Which three statements are true about network layer addressing? (Choose thre e.) answer: It uniquely identifies each host. // It assists in forwarding packets a cross internetworks.//It uses a logical 32-bit IPv4 address. - It is not a configurable address. - It is a physical address. - It identifies the host from the first part of the address. When connectionless protocols are implemented at the lower layers of the OSI mod el, what is usually used to acknowledge that the data was received and to reques t the retransmission of missing data? answer: an upper-layer, connection-oriented protocol or service Refer to the exhibit. The command that is shown was issued on a PC. What does th e IP address 192.168.33.2 represent? answer: primary domain name server for the host Refer to the exhibit. A network administrator remotely accesses the CLI of Route rB from PC1 using Telnet. Which statement is true about this connection?

answer: The connection is made through a VTY session on the router. Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which de vice will send a response to the initial tracert packet from PC1? answer: London 1. What is the framing method used in PPP? answer: byte stuffing 2. Assumme the RTT 200ms, the transmission time of a Web object 10ms,how long do es it take answer: 410ms 3. FPT uses port 21 for sending answer: Identification and password...data file 4. In the exponential backoff phase of CSMA/CD, after n collisions of a frame, t he adapter then waits K x 512 bit answer: {0,1,2,...,2m-1} where m=min(n,10) 5. In the PPP frame, the........... field defines answer: FCS 6. Main reason of packet loss in the Internet is...... answer: Routers drop packets because their buffers are full 7. The Link State (LS) algorithm results in....... answer: The least cost path fromm one node to all nodes in the network 8. What are the two methods of circuit switching for dividing answer: FDM and TDM 9. In the DNS, the names are defined in .......... structure answer: A tree 10. What is the protocol that network devices answer: DHCP 11. A name server is....... for a host if it always has a DNS record that answer: Authoritative 12. In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link 13. Two-dimensional parity check can......... answer: Detect a single bit error and correct it 14. Which statement is correct about packet switching and circuit switching answer: With the same delay performance, packet-switching allows more number of users than circuit switching 15. Why CSMA/CD is not used in Wifi? answer: Because of the hiden terminal problem and fading problem 16. When CRC is calculated consider the 4-bit generator G=1001 and suppose that D has the value 111010. answer: 101 17. Those followings answer: TCP congestion control 18. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of Ip addresses that can be assigned to this subnet answer: 129.17.129.96-129.17.129.127 19. Which delay mainly depends on the congestion of the network? answer: congesting delay 20. What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unittime 21. Traceroute command uses answer: ICMP 22. Which one is correct about P2P network? answer: A user computer can be both client and server 23. Generic router architecture includes answer: All of them 24. The core of the internet consist of answer: Routers 25. Very popular browser-based email services such as Hotmail or Yahoo! answer: HTTP 26. There are 4 serial links between the client and the server, with the transmi

ssion rates being 1Mbps, 3Mbps, 2 Mbps answer: 0.5 Mbps 27. Which of the following is the Mac protocol answer: CSMA/CD 28. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the first collision of a frame, the adapter then waits.... answer: 512 microseconds 29. IMAP is designed to allow users to manipulate......., so it is more..... tha n POP3 answer: Remote mailboxes...complex 30. CSMA/CA belong.....group, one of three broad classes of MAC protocols answer: Random access 31. What is incorrect about Web cache (proxy server)? answer: Web caches can improve in Internet performance in general 32. The transport layer protocol provides logical communication between....runni ng on different hosts, while the network layer protocol provides logical communi cation between..... answer: Processes...Hosts 33. In TCP congestion control, two important variables the sender has to keep tr ack are answer: Congestion window and socket number 34. In IP fragmentation, a datagram is fragmented into two packets, the the firs t packet has answer: Offset=0 and FragFlag=1 35. rdt3.0 provides reliable data transfer over a ........... answer: Lossy channel with bit errors 36. The time-to-live (TTL) field in the datagram is included to insure that data grams....... answer: Do not circulate forever in the network 37. A datagram is fragmented into three smaller datagrams. Which of the followin g is true? answer: The identification field is the same for all three datagrams 38. Each TCP segment has ......bytes of header overhead where as UDP has.... byt es of overhead. answer: 20...8 39. In OSI model, as data packet moves from the lower to the upper layer header are .... answer: removed 40. Which one is correct about Denial of Service (DOS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic. 41. Which statement is correct about router? answer: Each interface to have an unique IP address. 42. Which of the following is hybrid of client-server and P2P? answer: Skype 43. Channel partitioning, random access, and taking turns are ..... answer: Mac protocols 44. The broadcast MAC address in Lan is answer: FF-FF-FF-FF-FF-FF 45. The DNS protocol runs over ........... and uses port ................. answer: UDP...53 46. In Congestion avoidance of TCP flow control, if timeout occurs while the cur rent congestion window size is 16, the congestion window will answer: Remain 16 47. What is the total delay for transmission of 1.25 megabytes of images over fi ber optic cable with distance of 3000km with transmission rate of 1 Gbps answer: 20msec 48. Which one is not in UDP segment header? answer: Receiving Window Size 49. The ........... that together implement the DNS distributed database, store

.......... for the hostname to IP address mappings. answer: Authoritative servers .....Entries 50. What is Not a function of a router? answer: Working with IP address. 51. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in but before the rest of frame has arrived 52. The purpose of ICMP echo request and ICMP echo relay messages is to...... answer: report errors 53. This job of delivering the data in a .....to the correct.........is called d e-multiplexing answer: tranport-layer segment....application process 54. The combination of an IP address and a port number is called a.... answer: socket 55. Which layer in the Internet that connects directly to wire? answer: Physical 56. ......... is a supplementary protocol that allows non-ASCII data to be sent through email. answer: MIME 57. ......Applications typically uses......... answer: Elastic....DNS 58. In TCP, what can happen if the timeout is smaller than the connection's roun d-trip time? answer: It can result in unnecessary retransmissions 59. Which of the following is the pipelining protocol answer: Selective Repeat 60. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer: 201.14.78.64 Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number Which best describes the function of the Physical Layer? answer: Provides electrical, mechanical, procedural and functional means for act ivating and maintaining links between systems. What best describes the functions of the Application Layer? answer: Defines end-to-end delivery of packets What happens after a collision has occurred on a network after the jam signal is sent? answer: All stations stop sending frames for a randomly selected time period Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? answer: Ethernet switch Why has a layered network model been developed?

answer: Accelerates evolution, ensures interoperable technology and facilitates modular engineering. Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? answer: Windowing If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? answer: 14 During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? answer: Acknowledgement and retransmission Which Layer of the OSI model is concerned with the topology of a network? answer: Data Link Which network device provides internetworking and broadcast control? answer: Router Where is the Layer 2 address found on a workstation? answer: On the network interface card What are the most common LAN technologies used in networking today? answer: Ethernet, token ring, FDDI Which of the following is true about a CSMA/CD network? answer: One node's transmission traverses the entire network and is seen and che cked by every node. Which Layer of the OSI model provides data representation and code formatting? answer: Presentation Layer What correctly describes the five conversion steps of data encapsulation? answer: Data-segments-packets-frames-bits Which OSI Layer determines best path selection? answer: Network Layer Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? answer: There will be no response. Which Layer of the OSI model handles data encryption? answer: Presentation Routers make forwarding decisions based on which kind of address? answer: logical Which Cisco IOS command is used to enter privileged mode? answer: enable What is the default user-mode prompt for a Cisco router? answer: Router> What do WAN Data link protocols describe? answer: How frames are carried between systems What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? answer: It indicates the location of an error in a command string What best describes Frame Relay? answer: Uses high quality digital facilities with no error correction Which layers of the OSI model do WAN standards describe? answer: Physical and data link Which is an example of a data circuit terminating equipment (DCE)? answer: Modem What is the prompt of a Cisco router in the priviledged mode? answer: Router# Which packet-switched service is more efficent than X.25? answer: Frame Relay If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? answer: B. ? What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface?

answer: The spacebar Which memory component of a router loses its content when the router is turned o ff? answer: RAM What can only be done in privileged mode on Cisco routers? answer: Change the configuration Which character is used to enter the help mode? answer: ? Which protocol does a WAN use to make path determination decisions? answer: IP Which WAN protocol supports point-to-point and multipoint configurations? answer: HDLC Which of the following WAN technologies is a Circuit-Switched Service? answer: Narrowband ISDN Which of the following WAN technologies is a Cell-Switched Service? answer: Asynchronous Transfer Mode Which of the following are stored in NVRAM? answer: Configuration Files What do the WAN Physical Layer standards describe? answer: Interface between DTE and DCE Which keystroke will recall the previous command entry on a Cisco router user in terface? answer: Up arrow Which service does a WAN provide to LANs? answer: Exchange of data packets between routers and the LANs they support In which Layer of the OSI Model do WAN routers operate? answer: Network Layer When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? answer: User mode Which Cisco IOS command shows the configuration file stored in NVRAM? answer: show startup-config Which external configuration source is used with a modem? answer: Auxiliary Port The show interface serial Cisco IOS router command can display which one of the following lines of information? answer: Serial1 is up, line protocol is up. Which router component stores configuration files even when power is off? answer: NVRAM What is the router prompt for the interface configuration mode? answer: Router(config-if)# Which protocol is used to show summary configuration information about a directl y connected Cisco router? answer: Cisco Discovery Protocol Which Cisco IOS command is used to show current telnet connections? answer: show sessions What is the correct command to go from the user EXEC mode to the privileged EXEC mode? answer: enable Which Cisco IOS command displays routing table entries? answer: show ip route What is stored in working RAM and is constantly updated when the router is worki ng properly? answer: Routing Table When is the configuration file loaded into RAM? answer: Each time the router is initialized Which command will indicate the status of IP, IPX, and AppleTalk? answer: show protocols What is the first thing the router does when power is turned on? answer: Executes a bootstrap program

Which port is used to initially configure a router? answer: Console Which response to the appropriate show command indicates an operational serial l ink? answer: Serial1 is up, line protocol is up Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? answer: RXBOOT How many Telnet sessions can a Cisco router have simultaneously? answer: 5 Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? answer: show startup-config Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which command shows the status of Ethernet, Serial, BRI, and other ports? answer: show interfaces Which router component is responsible for the power-on bootstrap sequence? answer: ROM Which command displays information about the current Cisco IOS software version running on a router? answer: show version In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? answer: Layer 2 Which Cisco IOS command displays the backup configuration file stored in NVRAM? answer: Router# show startup-config While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? answer: square brackets - example [yes] What is the first global configuration parameter set when using the setup mode? answer: host name of the router What is the function of the erase startup-config command? answer: It deletes the configuration file in NVRAM You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? answer: copy running-config startup-config Which command will save an active configuration? answer: copy running-config startup-config How does the router prompt appear when you are in global configuration mode? answer: Router(config)# Where is the next place a router looks if it cannot find the IOS image in flash? answer: TFTP What is the function of the reload command? answer: It reboots the router Which of the following is the correct order in which a router boots and looks fo r files? answer: 1,5,7,6,2,4,3 When setting passwords for vty 0 4, what are you setting a password for? answer: Telnet sessions What is an important function of the power-up self test (POST)? answer: Executes diagnostics that verify the basic operation of router hardware Which password is encrypted in the configuration file by default? answer: Enable secret Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is an important result of the configuration file loading onto a router? answer: Starts routing processes, supplies addresses for interfaces, and sets up

media characteristics Where is the configuration file saved when you complete the setup process? answer: NVRAM Once you have selected an interface to configure, which prompt would be on the s creen? answer: Router(config-if)# You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? answer: banner motd Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C Which command is used to copy a system image to a network server? answer: Router# copy flash tftp Which configuration register mode is used to tell the router to boot answer: 0x---1 Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename Which command can be used to check the amount of system memory available? answer: Router# show flash In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets Which type of addressing scheme is formed by MAC addresses? Answer: @A. flat Which address(es) appear in an IP packet's header? Answer: source and destination addresses Which of the following is a benefit of network segmentation? Answer: reduced congestion Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer: 205.255.170.205 Which octet(s) are assigned locally in a class B address? Answer: The third and fourth octets are assigned locally What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? Answer: 6 What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? Answer: subnets Which class of network addresses allows the borrowing of 15 bits to create subne ts? Answer: Class A Which part of a network layer address does the router use during path determinat ion? Answer: the network address Which of the following represents the use of binary ones in a subnet mask? Answer: subnet and network bits How large is the network/subnet portion of a Class B license having a subnet mas k of 255.255.240.0? Answer: 20 bits How many bits are in an IP address? Answer: 32 How many total subnets can be created if four bits are borrowed from the host fi eld? Answer: 16 What is specified by the network number in an IP address? Answer: the network to which the host belongs Which of the following assists devices on the same network in determining a pack et's final destination? Answer: host ID

Which of the following would be the largest possible number expressed by an 8 bi t binary number? Answer: 11111111 Which of the following best describes the address 139.219.255.255 in an unsubnet ted environment? Answer: Class B broadcast address The IP address for a router interface should be part of what? Answer: the network attached to the interface When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? Answer: IP address of the destination host What is the correct term for when routes are learned automatically? Answer: dynamic routing What do bridges and switches use to make data forwarding decisions? Answer: physical addresses Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer: router Which type of routing protocol is RIP? Answer: distance vector Router ARP tables hold information from which of the following? Answer: all networks connected to them What is the most common protocol used to transfer routing information between ro uters located on the same network? Answer: RIP In a connection-oriented system, what happens before any user data is transferre d? Answer: a connection is established between the sender and receiver What happens if a data packet reaches a router that is destined for a network wi th which that router is not directly connected? Answer: The router forwards the packet to another router that most likely contai ns information about the destination. Which of the following contains a unique network number that is used in routing? Answer: IP address Which protocol is used to dynamically assign IP addresses? Answer: DHCP Connection-oriented network processes are often referred to as what? Answer: circuit switched Which describes the changes made to a packet's IP destination address, as that p acket is passed from router to router on it's way to the destination host? Answer: The destination IP address never changes. Which protocol can find the MAC address of a computer given its IP address? Answer: ARP Why is a static route the preferred method for reaching stub networks? Answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer: proxy ARP Which is an example of a routed protocol? Answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? Answer: transport What do routers use to exchange routing tables and share route information? Answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? Answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? Answer: IGRP In a connectionless system, which of the following is correct?

Answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? Answer: IP What are the two proprietary routing protocols developed by Cisco? Answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? Answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer: the domain The Telnet application works mainly at which layers of the OSI model? Answer: application, presentation, and session Which application layer protocol supports e-mail programs? Answer: POP3 What is the language used to create web pages? Answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? Answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? Answer: IP address Which protocol is designed to download or upload files on the Internet? Answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? Answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? Answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? Answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? Answer: DNS E-mail addresses consist of which two parts? Answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? Answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? Answer: hyperlink What is the data-link destination address of a broadcast message? Answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? Answer: All devices look at the request and ONLY host B will reply with the MAC address Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? Answer: Session Which best describes the structure of a MAC address? Answer: 24 bit vendor code plus 24 bit serial number

3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical 8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask 8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64 8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless 8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two

8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r. answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process. answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem? answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network

8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data. answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides? answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer . answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080 8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol 8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal?

answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true? answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch? answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks 8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer?

answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain 8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation 8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers? answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN?

answer: a. The source device encapsulates data in a frame with the MAC addre ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______ answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI? answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps 8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm 8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer? answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet

that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets? answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename 6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting? answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address?

Answer:

*A.

00-D0-56-F2-B5-12

5.9.ARP stands for __________ Answer: A. Address Resolution Protocol 5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte 14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization

17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record.

alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address? Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls

39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21

IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours

In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star 5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security

11. Which topology requires a multipoint connection? answer (d): Bus 12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added 20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer? Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport 28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero

31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________. Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise

49. A sine wave is ________. Answer: d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise 55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line 63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital

66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude? Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI 73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation. Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude

84. Which of the following is most affected by noise? Answer: d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases 89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating

101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands.

Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM 119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM 120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications. Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial 125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light 129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables 133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than

136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index 140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical 143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are

stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch? Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______

. Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______. Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end 175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6 182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL 185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data 187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe

Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder 195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded

205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error? Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are 210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and

data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation 249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______. Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium.

Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80

275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP 278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer. Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame. Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC) 299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates

301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID. Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical 311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing. Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit. Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits.

Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station . Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the 332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium 336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b) 340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length. Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit

355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches. Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine 366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou

ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above 386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______. Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c) 403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram.

Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP 423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? 1 Answer: c. n 425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing

427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB

451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______. Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited 461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket 473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field.

Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port 486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______. Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender

494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP 503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. Answer: c. Scalability 506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper

507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate. 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above 511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio 513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error. Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time. Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open

522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent 523. The server program is _______ because it is always available, waiting for a client request. Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open 527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time. Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program 535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream

536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er. Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain 544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve

r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain to resolve its IP address? Answer: b. kenz.acct.sony.jp 551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true. 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once 555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding 561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type 562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG

563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type 565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email. Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above 568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above 575. A request message always contains _______. Answer: d. A request line and a header 576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number

577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. Answer: a. PUT 579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents 581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP 583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response 587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th

e server site? Answer: c. Static 592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head 593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute 595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above 597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE 603. Which category of HTML tags allows the listing of documents? Answer: c. List 604. A program can use _______ to write a CGI program. Answer: d. Any of the above

605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static 606. The server receives input from a browser through _______. Answer: b. A form 607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML 609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression 618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network).

Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______. Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file. Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive 628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode 632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only

633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm 634. Before a message is encrypted, it is called _______. Answer: d. Plaintext 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher 637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key 639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above 642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509

647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS 655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce 658. A _______ certifies the binding between a public key and its owner. Answer: c. CA 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45

660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH 668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______. Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer

level. Answer: c. IPSec 673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy. Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid 681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits 5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.

Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses. Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets 10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded? Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol? Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop? Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above. 11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space.

Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol. Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP? Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______. Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited 3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der? Answer: C) Length of header 9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence 12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea

program. Answer: C)

Socket

15 INCORRECT The _______ field is used to order packets of a message. Answer: A) Sequence number 16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? Answer: D. EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25 Answer: C. Centronics-50 7.

Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Answer: C. Repeater 9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment 10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? Answer: C. Coax 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer: A. Print server

18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. Answer: B. RG-58 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus 7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP 12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable?

Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Answer: D. Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? Answer: B. NAS devices are less expensive. 16. used on Answer: 17. Answer: An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500

18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Answer: B. NIC In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP

A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt

e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash 14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention?

answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS 17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server 19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM? answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash 26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use? answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet.

Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address. If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time. What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors

What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination? answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs? answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers? answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP? answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip

What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1 answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error? answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin

g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0 Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing? answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table? answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards? answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM.

Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries? answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay. When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20 Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires? answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing?

answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2 Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree 003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors

004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field. answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size 009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1 016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP 020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec 021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process

022. Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control 023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet. answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals

Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____ answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8 Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011 The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______. answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium

The information to be communicated in a data communications system is the ______ . answer: Message Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented _____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow

In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP Thick Ethernet can be extended to _____ meters per segment answer: 500 _____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____ answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___

_ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____ _ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called .. answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise ______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3

What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14

On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25

Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching?

Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection

Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59

FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords.

Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81

Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92

which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102

You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP

Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124

The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136

IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head .

ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 protocol for communication over point .

In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 . meters per segment.

In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170

What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. . .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers.

Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented

10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN?

Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide

ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?-----------------------------

Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency.

Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are

13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical

19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin

g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________

Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network

4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold.

Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to:

Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic

A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error

is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical

DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document

Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___

Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP

TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer

A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not

What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi

ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared.

How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier

The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network

This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true?

Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender

Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1

Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time

Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not

What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN

What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct?

answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____

Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use?

Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local

Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model.

Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47

What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the

Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag.

We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device?

Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is

Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum

Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112

Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors

Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link?

Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC .

Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. protocol for communication over point .

Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams . meters per segment.

Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a of bytes and allows the r handshaking. . . .

eceiving process to obtain data as a Answer: stream,stream

of bytes.

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl

d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits

7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. ows the Answer: 23. Answer: 24. TCP allows the sending process to deliver data as a ___ of bytes and all receiving process to obtain data as a ___ of bytes. stream; stream TCP uses ___ to check the safe and sound arrival of data. an acknowledgment mechanism In the OSI model, as a data packet moves from the lower to the upper lay

ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay

er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn

ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism

8. Answer: 9. Answer: 10. CP. The Answer:

TCP is a (n)__________transport protocol. Reliable What is the combination of an IP address and a port number called? A socket The bytes of data being transferred in each connection are numbered by T numbering starts with a Randomly generated number

1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online

18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify?

Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol

Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is

Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA

2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1

3. Answer: 4. Answer: 5. Answer: 6. Answer:

Repeaters function in the layer Physical Which cable type used for segment lenth more than 2000m. Fiber optics What network device decreases collision switch Transceiver _____specifies a physical star topology central hub . Twisted-pair

Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses?

Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is :

Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2)

Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is

Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model

Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection?

Answer: A.

FIN

Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission

1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t

imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI

___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol?

Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0

What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN)

One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router?

Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP

Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism

. Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed

There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________

Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request

An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record

What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs

The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP

In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6%

What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message,

Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc.

Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used?

Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend.

answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership.

answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7

In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20,

40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1

Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link

Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52

Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC?

Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment

Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85

In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic

Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106

___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header

Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20

Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the .

Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. .

Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 meters per segment. protocol for communication over point

What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of . . .

the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184

____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the

MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc

ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless

33. Answer: 34. nswer. Answer: 35. Answer:

In classless addressing, ___ is assigned to an organization. a fixed number of blocks In ___ resolution, the resolver expects the server to supply the final a recursive By default, FTP uses which ports? 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63

10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __

_____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video

files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC

Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask

What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following? Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation? Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed? Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used

Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion? Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps? Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching? Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets? Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers? Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity? Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols?

Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur? Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers? Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router? Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates? Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded? Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27? Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list?

Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs? Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2? Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address? Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing? Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates. Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing

Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network? Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1 Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer? Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure? Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following? Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs?

Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off? Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols? Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork?

Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table? Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would

require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request? Answer: #Ping 8. If Acme Inc. occupies the first three floors of a building and each flo or is 1500 square meters, how many wiring closets should be installed answer: six 8. What is the first step in locating a wiring closet for a network? answer: Identify on a floor plan, all devices that will be connected to the netw ork. 8. What kind of power disturbances can be caused by strikes? answer: surges 8. What network device is used in an extended star topology when the catchment a rea of one wiring closet is not enough? answer: repeatter 8. What is a common cause of oscillation often called harmonics? answer: excessively long electrical wiring runs 8. Why are common mode problems a hazard to you or your computer? answer: They go directly to the computer chassis. 8. Where should the main distribution facility (MDF) be located in a multi-story building using an extended star topology? answer: on one of the middle floors 8. What best describes the difference between alternating and direct current? answer: DC flows at a constant value, whereas AC rises and falls. 8. How does AC line noise create problems? answer: by adding unwanted voltage to the desired signals 8. What is the "one-hand rule?" answer: Only touch electrical devices with one hand at a time to prevent electri city from flowing through the body. 8. Which type of networking media is now installed most often for backbone cabli ng? answer: 62.5/125 micron fiber-optic cable 8.Which of the following is a source that can produce interference on UTP cable? answer: fluorescent lights 8. Why are split pairs a problem for network installations? answer: The wires are part of different circuits so signals are not protected an d cross-talk occurs. 8. When should cable not be routed in an existing raceway?if it already contains a power cable answer: if it already contains a power cable 8. What is the central junction for the network cable? answer: wiring closet 8. What should be used to mount cable to a wall? answer: tie wraps 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: IDFs 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: Wear baggy clothes. 8. What tool would you use to attach CAT5 cable to a patch panel? answer: punch tool 8. What is one advantage of using distribution racks for mounting patch panels? answer: allows easy access to both the front and back of the equipment 8. Why is the wiring sequence critical when RJ-45 jacks are used at the telecomm

unications outlet in a horizontal cabling scheme? answer: For the network to function properly. 8. What is the most important thing to do before you work in walls, ceilings or attics? answer: Turn off power to the area. 8. What kind of jack must be used for making a connection to a Category 5 unshie lded twisted pair cable in a horizontal cabling scheme? answer: RJ-45 8.Why shouldn't you install a jack in the bottom five centimeters of a wooden ba seboard? answer: The bottom plate of the wall will prevent you from pushing the box 8. Which of the following describes a cable tester measurement of signal attenua tion? answer: It measures the reduction in power of a signal received from a signal in jector. 8. How is an RJ-45 jack surface mounted? answer: adhesive backed or screw box 8. What is the first thing you should do if near-end crosstalk is detected? answer: Visually check the horizontal cabling. 8.Which best describes a patch panel's function? answer: It acts as a switchboard where horizontal cabling from workstations can be connected to other devices to form a LAN. 8. How many pins are on each of the ports of a patch panel? answer: 8 pins 8. What should be done when preparing to run cable? answer:Label the boxes and cable. 8. What kind of a cable must you use when laying cable through spaces where air is circulated? answer: fire rated 8. How does a cable tester (a TDR) measure distance? answer: It times the signal sent towards and reflected back from the end of an o pen-ended cable 8. What type of raceway should be used if it will be visible in the room? answer: decorative 8. Why is establishing a baseline performance level for a network important? answer: for future periodic testing of the network and diagnostics 8.What is a rough diagram that shows where the cable runs are located called? answer: cut sheet 8. When running cable from the wiring closet to wall jacks, where is the cable i tself labeled? answer: at each end 8. What characteristic must hosts on a network possess in order to communicate d irectly ? answer:same network ID 8. Which of the following describes the effect of subnetting on the amount of br oadcast traffic? answer: decreases it, because broadcasts are not forwarded outside a subnet 8. Which of the following correctly describes an ISP? answer: Internet Service Provider 8.Which of the following is an example of a Class C broadcast address? answer: 221.218.253.255 8. What is decimal number 164 in binary? answer: 10100100 8. Which of the following is the approximate number of hosts supported in a answer:65 thousand 8. Which of the following describes the relationship between path determination and the routing of packets? answer: they are the same process 8. Which OSI layer adds an IP header? answer: Layer 3

8.Which type of addressing scheme is formed by MAC addresses? answer: flat 8. Which address(es) appear in an IP packet's header? answer: source and destination addresses 8. Which of the following is a benefit of network segmentation? answer: reduced congestion 8. Which of the following would be the decimal value of the binary IP address 11 001101.11111111.10101010.11001101? answer: 205.255.170.205 Why is a static route the preferred method for reaching stub networks? answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? answer: proxy ARP Which is an example of a routed protocol? answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? answer: transport What do routers use to exchange routing tables and share route information? answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? answer: IGRP In a connectionless system, which of the following is correct? answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? answer: IP What are the two proprietary routing protocols developed by Cisco? answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? answer: the domain The Telnet application works mainly at which layers of the OSI model? answer: application, presentation, and session Which application layer protocol supports e-mail programs? answer: POP3 What is the language used to create web pages? answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? answer: web browser

If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? answer: IP address Which protocol is designed to download or upload files on the Internet? answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? answer: DNS E-mail addresses consist of which two parts? answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? answer: hyperlink What is the data-link destination address of a broadcast message? answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? answer: All devices look at the request and ONLY host B will reply with the MAC address. Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? answer: Session Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number 1. What is the framing method used in PPP? answer: byte stuffing 2. Assumme the RTT 200ms, the transmission time of a Web object 10ms,how long do es it take answer: 410ms 3. FPT uses port 21 for sending answer: Identification and password...data file 4. In the exponential backoff phase of CSMA/CD, after n collisions of a frame, t

he adapter then waits K x 512 bit answer: {0,1,2,...,2m-1} where m=min(n,10) 5. In the PPP frame, the........... field defines answer: FCS 6. Main reason of packet loss in the Internet is...... answer: Routers drop packets because their buffers are full 7. The Link State (LS) algorithm results in....... answer: The least cost path fromm one node to all nodes in the network 8. What are the two methods of circuit switching for dividing answer: FDM and TDM 9. In the DNS, the names are defined in .......... structure answer: A tree 10. What is the protocol that network devices answer: DHCP 11. A name server is....... for a host if it always has a DNS record that answer: Authoritative 12. In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link 13. Two-dimensional parity check can......... answer: Detect a single bit error and correct it 14. Which statement is correct about packet switching and circuit switching answer: With the same delay performance, packet-switching allows more number of users than circuit switching 15. Why CSMA/CD is not used in Wifi? answer: Because of the hiden terminal problem and fading problem 16. When CRC is calculated consider the 4-bit generator G=1001 and suppose that D has the value 111010. answer: 101 17. Those followings answer: TCP congestion control 18. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of Ip addresses that can be assigned to this subnet answer: 129.17.129.96-129.17.129.127 19. Which delay mainly depends on the congestion of the network? answer: congesting delay 20. What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unittime 21. Traceroute command uses answer: ICMP 22. Which one is correct about P2P network? answer: A user computer can be both client and server 23. Generic router architecture includes answer: All of them 24. The core of the internet consist of answer: Routers 25. Very popular browser-based email services such as Hotmail or Yahoo! answer: HTTP 26. There are 4 serial links between the client and the server, with the transmi ssion rates being 1Mbps, 3Mbps, 2 Mbps answer: 0.5 Mbps 27. Which of the following is the Mac protocol answer: CSMA/CD 28. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the first collision of a frame, the adapter then waits.... answer: 512 microseconds 29. IMAP is designed to allow users to manipulate......., so it is more..... tha n POP3 answer: Remote mailboxes...complex 30. CSMA/CA belong.....group, one of three broad classes of MAC protocols answer: Random access

31. What is incorrect about Web cache (proxy server)? answer: Web caches can improve in Internet performance in general 32. The transport layer protocol provides logical communication between....runni ng on different hosts, while the network layer protocol provides logical communi cation between..... answer: Processes...Hosts 33. In TCP congestion control, two important variables the sender has to keep tr ack are answer: Congestion window and socket number 34. In IP fragmentation, a datagram is fragmented into two packets, the the firs t packet has answer: Offset=0 and FragFlag=1 35. rdt3.0 provides reliable data transfer over a ........... answer: Lossy channel with bit errors 36. The time-to-live (TTL) field in the datagram is included to insure that data grams....... answer: Do not circulate forever in the network 37. A datagram is fragmented into three smaller datagrams. Which of the followin g is true? answer: The identification field is the same for all three datagrams 38. Each TCP segment has ......bytes of header overhead where as UDP has.... byt es of overhead. answer: 20...8 39. In OSI model, as data packet moves from the lower to the upper layer header are .... answer: removed 40. Which one is correct about Denial of Service (DOS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic. 41. Which statement is correct about router? answer: Each interface to have an unique IP address. 42. Which of the following is hybrid of client-server and P2P? answer: Skype 43. Channel partitioning, random access, and taking turns are ..... answer: Mac protocols 44. The broadcast MAC address in Lan is answer: FF-FF-FF-FF-FF-FF 45. The DNS protocol runs over ........... and uses port ................. answer: UDP...53 46. In Congestion avoidance of TCP flow control, if timeout occurs while the cur rent congestion window size is 16, the congestion window will answer: Remain 16 47. What is the total delay for transmission of 1.25 megabytes of images over fi ber optic cable with distance of 3000km with transmission rate of 1 Gbps answer: 20msec 48. Which one is not in UDP segment header? answer: Receiving Window Size 49. The ........... that together implement the DNS distributed database, store .......... for the hostname to IP address mappings. answer: Authoritative servers .....Entries 50. What is Not a function of a router? answer: Working with IP address. 51. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in but before the rest of frame has arrived 52. The purpose of ICMP echo request and ICMP echo relay messages is to...... answer: report errors 53. This job of delivering the data in a .....to the correct.........is called d e-multiplexing answer: tranport-layer segment....application process

54. The combination of an IP address and a port number is called a.... answer: socket 55. Which layer in the Internet that connects directly to wire? answer: Physical 56. ......... is a supplementary protocol that allows non-ASCII data to be sent through email. answer: MIME 57. ......Applications typically uses......... answer: Elastic....DNS 58. In TCP, what can happen if the timeout is smaller than the connection's roun d-trip time? answer: It can result in unnecessary retransmissions 59. Which of the following is the pipelining protocol answer: Selective Repeat 60. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer: 201.14.78.64 Which layer of the OSI model ensures reliable, end-to-end communications? answer: transport Which layer of the OSI model provides routing functionality? answer: Network Which layer of the OSI model translates the data from upper-layer protocols into electrical signals and places them on the network media? answer: Physical You are a consultant designing a network for a company with more than 1000 users . Which 802 standard would you implement to ensure that bandwidth would be suffi cient and equal without bridging or additional segments? answer: 802.5 You have a limited budget and need to design a network for 50 users. Which 802 s tandard would you implement? answer: 802.3 You are installing a Windows 95/98 based TCP/IP network. You accidentally set work station B to the same IP address as workstation A. Which workstation(s) will rec eive an error message? answer: Both You are installing a Windows 95/98 based TCP/IP network. You accidentally set work station B to the same IP address as workstation A. Which workstation(s) will hav e a valid IP address? answer: Workstation A Unix uses which method to resolve Transport layer names into logical network add resses? answer: DNS Which of the following protocols use a connectionless transport? (Choose all tha t apply.) answer: TFTP Which protocols use a connection-oriented transport? answer: HTTP Which name resolution system is implemented with TCP/IP by default? answer: DNS Which OSI model layer has both a MAC sublayer and an LLC 12 sublayer? answer: Data Link Which OSI model layer is responsible for establishing, maintaining, and breaking down dialog? answer: Session Which OSI layer is responsible for network services such as messaging and file t ransfer? answer: Application Which OSI layer is responsible for building and tearing down packets? answer: Network On an Ethernet network, every station must have a _______________

answer: NIC Which type of hub doesn t require power? answer: Passive You are the administrator of a 100-station Ethernet network. Your users are comp laining of slow network speeds. What could you replace your hub with to increase your network throughput? answer: Switch At which OSI model layer do routers operate? answer: Network Which of the following is a MAC address? answer: 01:A5:BB:A7:FF:60 A network that uses 10Base2 requires answer: thin coax Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.) answer: the geographic scope of the network / the physical layer implementation/ the number of hosts to be interconnected Refer to the exhibit. Assuming that the network in the exhibit is converged mean ing the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for http:// www.server/? answer: 00-0c-85-cf-65-c0 Which options are properties of contention-based media access for a shared media ? (Choose three.) answer: non-deterministic / less overhead / collisions exist What is true concerning physical and logical topologies? answer: Logical topologies consist of virtual connections between nodes. What is true regarding media access control? (Choose three.) answer: Ethernet utilizes CSMA/CD / defined as placement of data frames on the m edia / Data Link layer protocols define the rules for access to different media Which statements describe the logical token-passing topology? (Choose two.) answer: Computers are allowed to transmit data only when they possess a token. / Electronic tokens are passed sequentially to each other. A network administrator has been asked to provide a graphic representation of ex actly where the company network wiring and equipment are located in the building . What is this type of drawing? answer: physical topology What is the purpose of the preamble in an Ethernet frame? answer: is used for timing synchronization with alternating patterns of ones and zeros What statements are true regarding addresses found at each layer of the OSI mode l? (Choose two.) answer: Layer 2 may identify devices by a physical address burned into the netwo rk card / Layer 3 represents a hierarchical addressing scheme Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit? answer: Network 1 uses CSMA/CD and Network 3 uses CSMA/CA. Refer to the exhibit. How many unique CRC calculations will take place as traffi c routes from the PC to the laptop? answer: 4 Refer to the exhibit. A frame is being sent from the PC to the laptop. Which sou rce MAC and IP addresses will be included in the frame as it leaves RouterB? (Ch oose two.) answer: source MAC - Fa0/1 on RouterB / source IP - PC Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? answer: MAC What two facts are true when a device is moved from one network or subnet to ano ther? (Choose two.) answer: The device will still operate at the same Layer 2 address. / The Layer 3

address must be reassigned to allow communications to the new network. What is a function of the data link layer? answer: provides for the exchange data over a common local media What is a characteristic of a logical point-to-point topology? answer: The media access control protocol can be very simple. What is a primary purpose of encapsulating packets into frames? answer: facilitate the entry and exit of data on media What is the primary purpose of the trailer in a data link layer frame? answer: support frame error detection What are three characteristics of valid Ethernet Layer 2 addresses? (Choose thre e.) answer: They are 48 binary bits in length. / They are considered physical addres ses. /They are generally represented in hexadecimal format. What the kind of Ethrnet cabling using industry-standard BNC connectors to form T junctions? answer: 10Base2 What are the key functions of encapsulation? (Choose three.) answer: identifies pieces of data as part of the same communication / ensures th at data pieces can be directed to the correct receiving end device / enables the reassembly of complete messages What is a primary function of the trailer information added by the data link lay er encapsulation answer: supports error detection Which two layers of the OSI model have the same functions as the TCP/IP model Ne twork Access Layer? (Choose two.) answer: Physical / Data Link Which three statements best describe a Local Area Network (LAN)? (Choose three.) answer: A LAN is usually in a single geographical area. / The network is adminis tered by a single organization. / A LAN provides network services and access to applications for users within a common organization. Refer to the exhibit. Which networking term describes the data interleaving proc ess represented in the graphic answer: multiplexing What is the primary purpose of Layer 4 port assignment answer: to identify the processes or services that are communicating within the end devices What can be identified by examining the network layer header answer: the destination host address What is the purpose of the TCP/IP Network Access layer answer: detailing the components that make up the physical link and how to acces s it Which layer encapsulates the segment into packets answer: network Select the statements that are correct concerning network protocols. (Choose thr ee.) answer: define the structure of layer specific PDU's / outline the functions nec essary for communications between layers / require layer dependent encapsulation s What is a PDU answer: a layer specific encapsulation Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP ses sion with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A? answer: an end device Refer to the exhibit. Which term correctly identifies the device type that is in cluded in the area B? answer: intermediary What device is considered an intermediary device answer: switch Which characteristic correctly refers to end devices in a network

answer: originate data flow Refer to the exhibit. How many CRC calculations will take place as traffic route s from the PC to the laptop? answer: 8 What determines the method of media access control? (Choose two.) answer: media sharing / logical topology Which devices are the layer 2 - device? (choose 2) answer: Switch + Hub The Data Link layer is divided into two sublayers answer: LLC + MAC What technology allows share single public IP address with many computers answer: NAT (Network Address Translation) What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/10? answer: 12.0.0.0 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/27? answer: 12.2.2.64 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/24. answer: 256 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/30. answer: 4 What is the last address of a block of classless addresses if one of the address es is 12.2.2.127/28? answer: 12.2.2.127 What is the last address of a block of classless addresses if one of the address es is 12.2.2.6/30? answer: 12.2.2.7 In fixed-length subnetting, the number of subnets must _______. answer: be a power of 2 An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length? answer: /24 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.64/28. How many addresses are granted? answer: 16 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.32.0/27. How many addresses are granted? answer: 32 What is the default mask for class A in CIDR notation? answer: /8 What is the default mask for class C in CIDR notation? answer: /24 In ________ addressing, when an address is given, we can find the beginning addr ess and the range of addresses. answer: classfil In a block, the prefix length is /22; what is the mask? answer: 255.255.252.0 In a block, the prefix length is /15; what is the mask? answer: 255.254.0.0 In a block, the mask is 255.255.192.0; what is the prefix length? answer: /18 In a block, the mask is 255.255.255.224; what is the prefix length? answer: none of the above Which of the following is a private IP address?

answer: 172.20.14.36 or 192.168.42.34 TestKing is migrating to a private IP addressing scheme. Which of the following describe the use of private IP addresses? (Choose two) answer: Addresses that cannot be routed through the public Internet. / A scheme to conserve public addresses. TestKing is using IP addressing according to RFC 1918. Which three address range s are used for internal private address blocks as defined by RFC 1918? (Choose a ll that apply) answer: 10.0.0.0 to 10.255.255.255 / 172.16.0.0 to 172.31.255.255 / 192.168.0.0 to 192.168.255.255 TestKing needs to ensure their IP network can be reached from the Internet. Whic h of the following host addresses are members of networks that can be routed acr oss the public Internet? (Choose three.) answer: 172.64.12.29 / 198.234.12.95 / 212.193.48.254 From where does a small network typically get its IP network addresses or IP blo ck? answer: From the Internet Service Provider (ISP) What are the two results of this configuration? (Choose two) answer: Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation./ The default route should ha ve a next hop address of 64.100.0.3. The number of addresses in a class A block is answer: 16,777,216 What is the broadcast address of a machine with an address of 128.200.100.100 an d a subnet mask of 255.255.224.0? answer: 128.200.96.255 You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol w ill you use to accomplish this? answer: DHCP What is the default mask for class B in CIDR notation? answer: /16 (A /8 , C /24) 1. What is the network address for a host with the IP address 123.200.8.68/28 ? answer: 123.200.8.64 + 123.200.8.65 2. If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary, which of the following is the correct bit pattern for the first octet? answer: 0xxxxxxx + 10xxxxxx 3. Which of the following hardware devices can be used to segment your network? answer: Router + Media converter 4. Using a Class C address range 192.168.21.12, your network needs twenty-eight subnets. Which subnet mask should you use? answer: 255.255.255.248 + 255.255.255.252 5. You have been assigned a Class C network address. Your manager has asked you to create 30 subnets with at least 5 hosts per subnet for the different departme nts in your organization. What should the subnet mask be to create 30 subnets? answer: a. 255.255.255.248 + 255.255.255.242 6. Your ISP has provided you the following Class B network range 131.107.0.0/24. Which of the following statements is true regarding this network? (Choose any t wo.) answer: There are 254 usable hosts per subnet /There are 254 usable subnets 7. Using the following address and subnet mask 195.106.14.0/24, what is the tota l number of networks and the total number of host per network? answer: 1 network with 254 hosts. + 2 networks with 128 hosts.

8. IP addresses use hierarchical numbering. What portion of the address identifi es the network number? answer: Class of first octet. +Assignments of DHCP.

9. Looking at this address 255.255.255.255, which one of the following is true? answer: a. IP, a flooded broadcast.+IP, a directed broadcast.

10. What does ISP stand for? a. Internet Service for Profit b. Internet Site Processing answer: c. Internet Service Provider 11. How many USABLE HOST addresses are available on a class B, unsubnetted netwo rk? a. 2 raised to the 16 power b. 2 raised to the 14 power c. 2 raised to the 14 power minus 2 answer: d. 2 raised to the 16 power minus 2 12. How many unique Class B NETWORK addresses are there? a. 2 raised to the 16 power answer: b. 2 raised to the 14 power c. 2 raised to the 14 power minus 2 d. 2 raised to the 16 power minus 2 13. There are ___ bits in an IP address. a. 4 b. 8 c. 24

answer: d. 32 14. In a Class A address where 4 bits have been borrowed for subnetting, ____ bi ts are left for host addresses. a. 24 answer: b. 20 c. 16 d. 4 15. What is the high order bit pattern that all Class B addresses start with in their first octet? a. 01_ _ _ _ _ _ answer: b. 10_ _ _ _ _ _ c. 1_ _ _ _ _ _ _ d. 0 _ _ _ _ _ _ _ 16. Which of the following assists devices on the same network in determining a packet s final destination? answer: a. Host ID b. Host protocol c. vendor number d. source IP address 17. What is the broadcast address of the second usable subnet in Class C where 4 bits were borrowed? a. x.x.x.255 answer: b. x.x.x.47 c. x.x.x.95 d. x.x.x.63 18. Every eight bits in an IP address is referred to as ____ ? a. Class Address

b. Octet c. Address group d. Decimal group 19. The source and destination address appear in an IP packet s ____ answer: a. Header b. Footer c. Field d. ADRS frame 20. Hosts that reside on a network with the same network ID can communicate dire ctly with each other. answer: a. True b. False 21. Given a Class A address that has been subnetted (8 bits borrowed), what is t he subnet mask? answer: a. 255.255.0.0 b. 255.0.0.0 c. 255.240.0.0 d. 0.0.255.255 22. Using a Class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use? answer: b. 255.255.255.224 +c. 255.255.255.240 Ethernet requires that valid frames must be at least answer: 64 bytes long With the following Manchester encoding, the bit stream transmitted is answer: 10100111 Quiz 1 1. One important role of the Network Layer is to: answer :D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps

belong to : answer :B. Local area networks(LAN) 3. One important role of the Transport Layer is to: answer :B. to multiplex and de-multiplex messages 4. Ethernet is answer :B. a type of LAN (Local area networks) 5. The difference between TCP and UDP is : answer :A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT are for implementing: answer :B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: answer :D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST ) answer :B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: answer :C. Internet and Local area networks Quiz 2 1. in sliding window Flow control with window size of W, the source _____ answer :sends up to W frames without ACK 2. Flow control____ answer :ensures the sender does not too much data that may overwhelm the receive / has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay

1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R 2.1.Which one is correct about P2P network? answer :A user computer can be both client and server 2.2.HTTP uses the services of _________ on well-known port 80. answer :TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er answer :TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? answer :All of the others 2.7.SMTP stands for answer :Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 2.9.IMAP and POP are_________ answer :Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. answer :MIME 3.1.TCP provides __________between application processes running on different ho sts answer :Logical communications

3.2.What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver 3.3.In the transport layer, the job of gathering data at the source host from di fferent application processes, enveloping the data with header information to cr eate segments, and passing the segments to the network layer is called _______. answer :Multiplexing 3.4.In the ________ algorithm of the TCP congestion control, the size of the con gestion window increases exponentially until timeout answer :Slow start 3.5.If the segment has sequence number of 128 and length of 8 bytes, the receivi ng computer will send ACK with value of _________ answer :136 3.6.Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not 3.7.What flag is used to close TCP connection? answer :FIN 3.8.The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel 3.9.TCP is a ___________ protocol. answer :Connection-oriented 3.10.TCP assigns a sequence number to each segment that is being sent. The seque nce number for each segment is the number of the _______ byte carried in that se gment. answer :First 4.1.What is the data unit used in Internet Protocol (IP)? answer :Datagram 4.2.DHCP is used by the server to: answer :Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? answer :32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? answer :All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) answer :2 4.6.Traceroute command uses answer :ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm 4.8.Routers operate in the _______ layers. answer :network 4.9.Dijkstra s algorithm is answer :A link-state routing algorithm 4.10.Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder answer :0000 5.2.______ is (are) (an) example(s) of random access MAC answer :All of them 5.3.In cyclic redundancy checking, what is CRC answer :the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN 5.5.What is store-and-forward operation in switches?

answer :They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet answer :CSMA/CD 5.7.Which one is the flag used for framing in PPP? answer :01111110 5.8.Which one can be a MAC address? answer :00-D0-56-F2-B5-12 5.9.ARP stands for __________ answer :Address Resolution Protocol 5.10.Parity checking _____. answer :can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests answer :proxy 2. The_______usually contains the sender address,the receiver address,and other information answer :envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. answer :base64 4. By default,FTP uses which ports? answer :20 and 21 5. HTTP uses the services of______on well-known port 80 answer :TCP 6. In the DNS, the names are defined in_________structure answer :an inverted-tree 7. _________is a language for creating Web pages. answer :HTML 8. With WWW as an example of client-server computer software,the server is: answer :The machine that makes WWW documents available. 9. A________document is created by a Web server whenever a browser requests the document. answer :dynamic 10. In a________connection,the server leaves the connection open for more reque sts after sending a response. answer :persistent 11. Which of the following statement is correct? answer :Full-Duplex :Communications in which both sender and receiver can send a t the same time 12. In cyclic redundancy checking,what is CRC answer :the remainder 13. IP is________datagram protocol answer :unreliable 14. In the________algorithm the size of the congestion window increases exponen tially until it reaches a threshold. answer :slow start 15. TCP uses___________to check the safe and sound arrival of data. answer :an acknowledgment mechanism 16. In the OSI model,encryption and decryption are functions of the________layer . answer :presentation 17. In________resolution,the resolver expects the server to supply the final . answer :recursive 18. The purpose of echo request and echo reply is to answer :check node-to-node communication 19. HDLC is a_______protocol answer :bit-oriented 20. To accomplish flow control,TCP uses a_________window protocol.

answer :sliding 21. TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. answer :stream ;stream 22. In sliding window flow control,if the window size is 63.What the range seque nce numbers? answer :0 to 63 23.In the OSI model,what is the main function of the transport layer? answer :process-to-perocess message delivery 24. Why was the OSI model developed? answer :standards were needed to allow any two systems to communicate 25. ________is more powerful and complex than______ answer :IMAP4;POP3 26. In moderm implementations of TCP,a retransmission occurs if the retransmissi on timer expiersor_______duplicate ACK segment have arrived answer :three 27. _______is the protocol suite for the current Internet answer :TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ answer :protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. answer :none is correct 30. To accomplish flow control,TCP uses a______window protocol. B answer :sliding 31. What network device decreases collision? answer :SWITCH 32.At the CRC generate,_______added the data unit before division process answer :0s are 33. Jitter is introduced in real-time data by the______ answer :delay between packets 34. What does the URL need to access a document answer :all are correct 35.What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer :DHCP 36. What flag is used to close TCP connection? answer :FIN 37.Maximum number of data flow through in N-port switch (LAN switch L2): answer : N/2 38. Base on distance, two MOST IMPORTANT types of computer network are: answer :Internet and local area network. 39. One important role of the Network Layer is to: answer :Perform network routing, i.e., to find the most efficient transmission r oute between two computers. 40. One important role of Transport Layer is to: answer :To multiplex and de-multiplex messages. 41. The difference between TCP and UDP is : answer :TCP is a protocol in Network Layer while UDP is in the Transport Layer. 42. Ethernet is

answer :A type of LAN 43. As learned in class, computer networks are classified based on: answer :Distance, switching 44. Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g : 54 Mpbs belong to: answer :LAN 45. DHCP is used to answer :Assigned IP addresses automatically 46. A binary file is 3375 bytes long. How long will it be if encoded using base6 4 encoding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? answer :4604

What type of service that VC network provides? (A) answer :Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. answer :bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? answer :18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. answer :OSI ___ audio/video refers to on-demand request for compressed audio/video files. answer :Interactive If ASCII character H is sent and the character I is received, what type of error s is this? answer :single-bit If ASCII character D is sent and the character G is received, what type of error s is this? answer :multiple-bit What type of routing protocol that BGP is? answer :Link State Routing A bridge has access to the ___ address of a station on the same network. answer :physical The ___ layer is responsible for the delivery of a message form one process to a nother. answer :transport Routers function in the ___ layers. (A)

answer :none is correct/data link and network The purpose of MTA is answer :Transferall of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? answer :strict source route What is the service that the UDP protocol provides? (C) answer :error detection What is information used to route packet in network? answer :destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) answer :uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. answer :10BASE-T The ____ domains define registered hosts according to their generic behaviour answer :Generic

A packet whose destination is outside the local TCP/IP network segment is sent t o the answer :Default gateway Which piece of information is not vital for a computer in a TCP/IP network? answer :DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. answer :removed Session layer of the OSI model provides answer :Dialog control IPv6 has _______ -bit addresses. answer :128 Which of the following can be an Ethernet physical address? answer :07:01:02:01:2C:4B An IP address contains________ bits ? answer :32 Which routing protocol below is used by exterior routers between the autonomous systems? answer :BGP Which of the IP headers decides when the packet should be discarded?

answer :TTL(time-to-live) Which IP address is reserved for software loop-back? answer :127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? answer :190.148 Which port is reserved for use of the SMTP protocol? answer :25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? answer :62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? answer :Assignment of more IP addresses Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? answer :EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? answer :Transport layer The Physical layer is connected with the movement of____over the physical medium . answer :Bits Which of the following statement is correct? answer :Full-Duplex: Communications in which both sender and receiver can send a t the same time What is the purpose of the IEEE 802 commitlee? To develop LAN standards In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ answer :Removed Which of the following is an appropriate description concerning B2C? answer :Ordering books online Which of the following is an appropriate description concerning mobile network u sers? answer :A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer. answer :Presentation Quiz Chapter3 If ASCII character G is sent and the character D is received, what type of error is this? answer :Burst At the CRC generate, added the data unit before division process. answer :0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state answer :Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state answer :Authenticating At the CRC checker,______if the data unit is damaged. answer :A nonzero remainder HDLC is a________protocol answer :Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this?

answer :Single-bit In cyclic redundancy checking, what is CRC answer :The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? 0 to 63 What is present in the HDLC control fiels for I-frame All are correct 11. G At the CRC generate, ___ added the data unit before division process. Answer :0s are Quiz Chapter4 What device can . answer :All Maximun of data flow through in N-port switch (an with L2) answer :N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? answer :1 Repeaters function in the layer answer :Physical Which cable type used for segment lenth more than 2000m. answer :Fiber optics What network device decreases collision switch answer :Transceiver _____specifies a physical star topology central hub . answer :Twisted-pair Quiz Chapter5 What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? answer :DHCP What is information used to route packet in network? answer :Destination Address fields in IP header What type of routing algorithm that OSPF use? answer :Shortest Path Routing What does the IP header s protocol field identify? answer :The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? answer :All are correct IP is________datagram protocol answer :Both a and b In classless addressing,_______is assigned to an organization. answer :A variable-length block Which layer does ICMP reside in? answer :Physical DHCP is used to: answer :Assign IP addresses automatically What is protocol used to inform errors concerning IP? answer :ICMP 11. In classless addressing, the ______ is another name for the common part of the address range. answer :prefix 12 In classless addressing, the _______ is the varying part (similar to the hostid). answer : suffix 13 In classless addressing, the prefix length defines the _____________.

answer :mask 14 The number of addresses assigned to an organization in classless address ing _______. answer : must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. answer : must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? answer : 2.4.6.64

17 Which address could be the beginning address of a block of 16 classless addresses? answer :none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? answer : 2.4.6.0 19. What type of routing protocol that BGP is? answer :Distance Vector Routing Quiz Chapter6 What is the data unit used in TCP? answer :Segment What is the service that the UDP protocol provides? answer :Guaranteed delivery What flag is used to close TCP connection? answer :FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ answer :Uses buffers The difference between TCP and UDP is primarily answer :One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. answer :Stream; stream TCP uses______________to check the safe and sound arrival of data. answer :An acknowledgment mechanism TCP is a (n)__________transport protocol. answer :Reliable What is the combination of an IP address and a port number called? answer :A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a answer :Randomly generated number Quiz Chapter7 ______is used to compress video. answer :JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. answer :Two ______is more powerful and complex than______. answer :IMAP4; POP3 What does the URL need to acess a document

answer :All are correct The purpose of MTA is answer :Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt. answer :Static With WWW as an example of client-server computer software, the server is: answer :The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. answer :Streaming stored In______resolution, the resolver expects the server to supply the final . answer :Recursive By default, FTP uses which ports? answer :20 and 21 11 . Currently two message access protocols are available:_____ and_____. answer :POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : answer :The machine that you use to display WWW documents Quiz 1 1. One important role of the Network Layer is to: answer :D.Perform network routing, i.e., to find the most efficient transmission route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : answer :B. Local area networks(LAN) 3. One important role of the Transport Layer is to: answer :B. to multiplex and de-multiplex messages 4. Ethernet is answer :B. a type of LAN (Local area networks) 5. The difference between TCP and UDP is : answer :A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT are for implementing: answer :B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: answer :D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST ) answer :B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: answer :C. Internet and Local area networks Quiz 2 1. in sliding window Flow control with window size of W, the source _____

answer :D. sends up to W frames without ACK 2. Flow control____ answer :B. ensures the sender does not too much data that may overwhelm the rece ive / D. has two techniques : Stop and Wait and Sliding window 3. In Stop and Wait Flow control, source____ answer :B. waits for the acknowledgment(ACK) before sending next frame 4. At the CRC checker, ____ if the data unit is damaged answer :D. a nonzero remainder 5. CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ w hile CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ answer :A. Ethernet__ Wireless Lan 7.If ASCII character H is sent and the character I is received, what type of err or is this? answer :a. Single-bit 8. Parity checking ___ answer :C. can detect a single bit error in a transmission 9. If ASCII character G is sent and the character D is received, what type of er ror is this? answer :d. Burst Quiz 3 1. IP address written as 200.23.16.0/23 means: answer :C. both are correct 2. A Virtual Circuit consists of answer :D. all are correct 3. What is the last address of a block of classless address if one of the addres ses is 12.22.2.127/28 answer :D. none of them 4. In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram answer :B. 2 5. What are general functions of router? answer :D. all are correct 6. An organization is granted a block of classless addresses with the starting a ddress 199.34.76.128/29. How many addresses are granted? answer :B. 8 7. Bridges function in the ___ layers answer :A. physical and data link 8. The time to live field in IP datagram answer :C. both are correct 9. NAT router must answer :C. both are correct 10. In a Datagram networks

answer :D. all are correct 11. How big is an IPv6 Internet address? answer :A. 128 bits 12. Which field in the IP header is used to prevent an IP packet from continuous ly looping through a network answer :C. time to live 13. Assume that the IP address has only 8 bits, first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnet can be addressed answer :B. 32 subnets and 8 hosts 14. What is tha data unit used in Internet Protocol(IP) answer :C. datagram 15. Which device can amplify and make signal to all computer in LAN answer :C. repeater 16. What is the protocol that network devices ( for example: modem ADSL) use to assign IP address to PCs in LAN automatically answer :B. DHCP Quiz 4 1. TCP is a(an)____ transport protocol answer :C. reliable 2. What is WRONG about UDP? answer :D. Use ACK to notify the sender that the packet has arrived the receiver 3. In Congestion avoidance of TCP congestion control, when timeout occurs, the c ongestion window _____ answer :C. Reduce to 1 4. In modern implementations of TCP, a retransmission occurs if the retransmissi on timer expires or ___ duplicate ACK segments have arrived answer :C. three 5. Those following: a) Slow start b) Congestion avoidance Fast recovery, are mechanisms of______ answer :A. TCP congestion control c) fast retransmit d)

6. If the segment has sequence number of 128 and length of 8 bytes, the receivin g computer will send ACK with value of answer :C. 136 8. What flag is used to close TCP connection? answer :B. FIN 9. In TCP congestion control, when timeout occurs answer :D. The threshold congestion window will be set to half of the current wi ndow size 10. What is the data unit used in TCP answer :A. Segment 11. What is the combination of an IP address and a port number called? answer :A. A socket

12. In the ____ stage of the TCP congestion control, the size of the congestion window increase exponentially until timeout occur. answer :C. slow start 13. The value of the acknowledgment field in a segment defines the number of the ___ bytes a party expects to receive answer :C. next 14. The difference between TCP and UDP is primarily answer :B. One is connection-oriented, one is connectionless 15. TCP assigns a sequence number to each segment that is being sent. The sequen ce number for each segment is the number of the ___ byte carried in that segment answer :A. first Quiz 5 1. In HTTP, a ______ server is a computer that keeps copies of responses to rece nt requests answer :B.proxy 2. With WWW as an example of client-server computer software,the server is: answer :A. The machine that makes WWW documents available. 3. In a________ connection, the server leaves the connection open for more reque sts after sending a response. answer :A.persistent 4. _____ is a language for creating Web pages answer :B. HTML 5. In the ______encoding scheme, 24 bits become 4 characters,and eventually are sent as 32 bits. answer :C. base64 5. HTTP uses the services of______on well-known port 80 answer :C. TCP 7. What is the total delay for transmission of 2000Mb of text over fiber cable w ith distance of 3000km with transmission rate of 2Gbps (ignore all other delay) answer :C. 10msec 8. Which layer does ICMP functions? answer :D. network layer 9. A ________ document is created by a Web server whenever a browser requests t he document. answer :B. dynamic 10. Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is us ed in Ethernet) can NOT be used in Wireless LAN answer :D. both of them 11. Which statement is best correct about UDP and TCP? answer :D. all of them 12. A sequence of 72 bits, after encoding using BASE64, become a sequence of answer :A. 96 bits 13. By default, FTP uses which ports?

answer :a. 20 and 21 14. In the DNS, the names are defined in_________structure answer :B. an inverted-tree Quiz 6 1. Which one best describes the advantage(s) of using cache in proxy server? answer :A. Reduce the delay time to download content from the remove a remove we b server 2. In cyclic redundancy checking, what is CRC answer :C. the remainder 3. In sliding window flow control. If the window size is 63. What the range sequ ence numbers? answer :C. 0 to 63 4. IP is _____ datagram protocol answer :C. both a and b 5. TCP uses __________ to check the safe and sound arrival of data answer :A. an acknowledgment mechanism 6. Which one is best correct for IMAP(Internet Mail Access Protocol) answer :D. All of them 7. HDLC is a ________ protocol answer :B. bit-oriented 8. Protocol used to exchange email between email server is: answer :C. SMTP 9. In the OSI model, encryption and decryption are functions of the ____ layer answer :B. presentation 10. The purpose of echo request and echo reply is to answer :B. check node-to-node communication 11. To accomplish flow control, TCP uses a___________ window protocol answer :B. sliding 12. Which of the following statement is correct? answer :C. Full-Duplex: communication in which both sender and receiver can send at the same time. 13. In______ resolution, the resolve expects the server to supply the final answer :B. recursive 14. If the ACK value is 200, then byte_____ has been received successfully answer :A.199 15. Which one is the returned code of the response from a web server when a clie nt successful connects to the web server answer :C. 200

Quiz 7 1. ______ algorithms are more efficient for short messages answer :D. Asymmetric-key 2. Which field in the IP header is used to prevent an IP packet from continuousl y looping through a network? answer :A. Time to live 3. How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :B. The summation of Two Round Trip and the Transmission Time 4. Which one is best correct about symmetric-key cryptography and asymmetric-key cryptography? answer :A. Symmetric-key cryptography has the same key both sender and receiver while asymmetric-key not 5. What are general functions of router? answer :D. All are correct 6.What type of service that VC network provide? answer :A. Connection-oriented 7. The purpose of MTA (Mail Transfer Agent) is answer :C. Transferal of message across the Internet 8. We can divide audio and video services into ____ broad categories. answer :A. three 9. A three-character data frame: A FLAG B when framing methods using Flag bytes with stuffing, the output will be: answer :A. A ESC FLAG B 10. Which protocol helps to transfer non-plain text files such as image or audio files via SMTP email systems? answer :C. MINE 11. Which statement is correct about Error Control in TCP/IP model answer :A. Error Control is implemented in both Data Layer and Transport Layer 12. What is the IP address used to test a PC s network card that don t need connect PC to another PC? answer :D. all are correct 13. A _____ server loads all information from the primary server answer :B. secondary 14. The value of receiving window size is determined by ____ answer :B. the receiver 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi

th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R

2.1.Which one is correct about P2P network? answer :A user computer can be both client and server 2.2.HTTP uses the services of _________ on well-known port 80. answer :TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er answer :TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? answer :All of the others 2.7.SMTP stands for answer :Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 2.9.IMAP and POP are_________ answer :Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. answer :MIME

3.1.TCP provides __________between application processes running on different ho sts answer :Logical communications 3.2.What is WRONG about UDP?

answer :Use ACK to notify the sender that the packet has arrived the receiver 3.3.In the transport layer, the job of gathering data at the source host from di fferent application processes, enveloping the data with header information to cr eate segments, and passing the segments to the network layer is called _______. answer :Multiplexing 3.4.In the ________ algorithm of the TCP congestion control, the size of the con gestion window increases exponentially until timeout answer :Slow start 3.5.If the segment has sequence number of 128 and length of 8 bytes, the receivi ng computer will send ACK with value of _________ answer :136 3.6.Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not 3.7.What flag is used to close TCP connection? answer :FIN 3.8.The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel 3.9.TCP is a ___________ protocol. answer :Connection-oriented 3.10.TCP assigns a sequence number to each segment that is being sent. The seque nce number for each segment is the number of the _______ byte carried in that se gment. answer :First 4.1.What is the data unit used in Internet Protocol (IP)? answer :Datagram 4.2.DHCP is used by the server to: answer :Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? answer :32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? answer :All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) answer :2 4.6.Traceroute command uses answer :ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm 4.8.Routers operate in the _______ layers.

answer :network 4.9.Dijkstra s algorithm is answer :A link-state routing algorithm 4.10.Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder answer :0000 5.2.______ is (are) (an) example(s) of random access MAC answer :All of them 5.3.In cyclic redundancy checking, what is CRC answer :the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN 5.5.What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet answer :CSMA/CD 5.7.Which one is the flag used for framing in PPP? answer :01111110 5.8.Which one can be a MAC address? answer :00-D0-56-F2-B5-12 5.9.ARP stands for __________ answer :Address Resolution Protocol 5.10.Parity checking _____. answer :can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer answer :802.11 2 UDP offers which of the following benefits relative to TCP answer :UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets answer :All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer answer :Session Layer 5 Which of the following is a Man answer :WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? answer :2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called

answer :Cell 8 Which of the following protocols provides the security for HTTPS answer :SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network answer :Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er answer :It is used for reordering of the octets received 11 Which of the following is not function of the data link layer answer :Data rate control 12 Which of following term does NOT belong the ToS field of IP Header answer :Priority 13 In Ethernet frame, the maximum size of the Pad field is answer :64 byte 14 Flow control is needed to prevent answer :overflow of the sender buffer 15 Which of the following is a valid IPv6 address answer :2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase answer :Quantization 17. in the resource records os DNS, which record is also know as an alias record answer :CNAME record. 18. A bridge can increase network effeciency by: answer :Learning and storing the MAC address for each NIC on each side og bridge and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? answer : BNCs 20. Which of the following are characteristic of a peer-to-peer network? answer : A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can answer : talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: answer :Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. answer : Replace repeater with hubs. 24. which of the following has the highest possible throughput? answer : Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? answer :1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state answer : establish

27. Find the minimum hamming distance for the correction of two errors answer : 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m answer : half-duplex. 29. what is a router? answer : a piece of hardware or software that forwards packet sbase on ip addres s. 30. OSPF multicasts are sent out as what class of address? answer :Class A 31.what is another name for a packet-switching network? answer : store and forward. 32. updates for a satellite s coordinates can be optained on the www. answer :Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? answer : Multipart / mixed 34. Port 110(POP) is what kind of port? answer : Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? answer :A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state answer : FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. answer :b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP answer :It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. answer :c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute answer :Hop count 42 The PING and the TRACEROUTE utilities uses protocol answer :ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data answer :Transport layer 44 Which of the following statements regarding protocol stacks are FALSE answer :A given protocol stack can run only one computer type In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network answer :Virtual-circuit network / Datagram network Which statement is correct for layering in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others

_______ is the protocol suite for the current Internet. answer :TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is answer :Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ answer :Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is answer :L/R Which one is correct about P2P network? answer :A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. answer :TCP _____ provides reliable, in-order transfer of bytes between client and server answer :TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? answer :All of the other SMTP stands for answer :Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 IMAP and POP are_________ answer :Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. answer :MIME TCP provides __________between application processes running on different hosts answer :Logical communications What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. answer :Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout answer :Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ answer :136 Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? answer :FIN The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel TCP is a ___________ protocol. answer :Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n

umber for each segment is the number of the _______ byte carried in that segment . answer :First What is the data unit used in Internet Protocol (IP)? answer :Datagram DHCP(dynamic host configuration protocol) is used by the server to: answer :Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? answer :32 subnets and 8 hosts Why NAT (Network Address Translation) is used? answer :All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) answer :2 Traceroute command uses answer :ICMP RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm Routers operate in the _______ layers. answer :network Dijkstra s algorithm is answer :A link-state routing algorithm Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder answer :0000 ______ is (are) (an) example(s) of random access MAC answer :All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) answer :the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station ______is used in Ethernet answer :CSMA/CD Which one is the flag used for framing in PPP answer :01111110 Which one can be a MAC address? answer :00-D0-56-F2-B5-12 ARP stands for _________ answer :Address Resolution Protocol Parity checking _____. answer :can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. answer : (c): Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer : (c): Simplex

3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer : (b): Mesh 4. Which topology requires a central controller or hub? answer : (a): Star 5. The _______ is the physical path over which a message travels. answer : (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer : (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer : (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer : (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer : (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer : (c): Security 11. Which topology requires a multipoint connection? answer : (d): Bus 12. A television broadcast is an example of _______ transmission. answer :(c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer : (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer : (d): Bus Chapter 2: Network Models 15. The _______ layer changes bits into electromagnetic signals. answer : (a): Physical 16. The physical layer is concerned with the transmission of _______ over the ph ysical medium. answer :c. Bits 17. Mail services are available to network users through the _______ layer. answer :c. Application 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. answer :d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____.

answer :b. Added 20. The _______ layer lies between the network layer and the application layer. answer :c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. answer :b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. answer :c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? answer :b. Transport layer 24. What is the main function of the transport layer? answer :a. Process-to-process delivery 25. Which of the following is an application layer service? answer :d. All the above 26. The Internet model consists of _______ layers. answer :b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. answer :c. Transport 28. The _______ layer is the layer closest to the transmission medium. answer :b. Physical Chapter 3: Signals 29. Before data can be transmitted, they must be transformed to ________. answer :a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. answer :b. Is greater than zero 31. A periodic signal can always be decomposed into ________. answer :c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? answer :c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. answer :a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. answer :c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. answer :b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? answer :d. 57 KHz

38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? answer :a. 3.96 MHz 39. As frequency increases, the period ________. answer :a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. answer :c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. answer :c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. answer :a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? answer :c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? answer :b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. answer :b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. answer :b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. answer :b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. answer :a. The signal is equal to the noise 49. A sine wave is ________. answer :d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. answer :c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. answer :b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. answer :d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the

signal. answer :c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. answer :b. Noise 55. The ________ has units of meters/second or kilometers/second. answer :c. Propagation speed 56. ________ has units of bits/second. answer :a. Throughput 57. The ________ has units of seconds. answer :b. Propagation time 58. The wavelength of a signal depends on the ________. a. Frequencies of the signal answer :b. Medium Chapter 4: Encoding and Modulation 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? answer :b. BnZS 60. Block coding can help in _______ at the receiver. answer :a. Synchronization / b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. answer :a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. answer :b. Line 63. _______ encoding has a transition at the middle of each bit. answer :d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. answer :a. Differential Manchester 65. PCM is an example of _______ conversion. answer :b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? answer :d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. answer :a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. answer :c. Variable 69. Synchronous transmission does not have _______.

answer :d. All the above 70. Which encoding type always has a nonzero average amplitude? answer :c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? answer :b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? answer :b. AMI 73. In PCM, an analog-to- _______ conversion occurs. answer :b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? answer :c. 6 75. RZ encoding involves _______ signal levels. answer :c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? answer :d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. answer :a. Asynchronous serial / b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. answer :b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels. answer :c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. answer :b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. answer :b. Less than or equal to Chapter 5: Multiplexing 82. AM and FM are examples of ________ modulation. answer :a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. answer :c. Amplitude 84. Which of the following is most affected by noise? answer :d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. answer :d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. answer :b. 800

87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________. answer :d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. answer :c. Increases 89. In 16-QAM, there are 16 ________. answer :b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? answer :d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. answer :d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? answer :c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? answer :d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? answer :c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? answer :b. 700 KHz 96. A modulated signal is formed by ________. answer :a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. answer :b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. answer :a. 50 99. When an ASK signal is decomposed, the result is ________. answer :a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. answer :d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. answer :d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. answer :b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK.

answer :a. Less than 104. What is the object of trellis coding? answer :c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. answer :a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. answer :a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. answer :c. Increases 108. The bit rate always equals the baud rate in which type of signal? answer :a. FSK 109. Which ITU-T modem standard uses trellis coding? answer :a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. answer :a. Less than Chapter 6: Switching 111. Which multiplexing technique transmits digital signals? answer :c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? answer :b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. answer :b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. answer :b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. answer :b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. answer :c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. answer :b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. answer :b. FDM 119. Which multiplexing technique transmits analog signals? answer :a. FDM / c. WDM

120. In a T-1 line, _______ interleaving occurs. answer :b. Byte 121. Which multiplexing technique involves signals composed of light beams? answer :a. WDM Chapter 7: Transmission Media 122. The VLF and LF bands use _______ propagation for communications. answer :b. Ground 123. Category 1 UTP cable is most often used in _______ networks. answer :b. Telephone 124. BNC connectors are used by _______ cables. answer :d. Coaxial 125. Which of the following is not a guided medium? answer :c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. answer :d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. answer :a. Coaxial 128. In fiber optics, the signal source is _______ waves. answer :b. Light 129. Smoke signals are an example of communication through _______. answer :c. An unguided medium 130. Which of the following primarily uses guided media? answer :c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? answer :a. Outer conductor 132. The RG number gives us information about _______. answer :c. Coaxial cables 133. Transmission media are usually categorized as _______. answer :a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. answer :b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. answer :b. Denser than 136. The inner core of an optical fiber is _______ in composition. answer :c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. answer :b. Reflection

138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. answer :a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. answer :b. Multimode step-index 140. In _______ propagation, the core is of varying densities. answer :c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. answer :c. The air 142. Transmission media are closest to the _______ layer. answer :b. Physical 143. Radio wave and microwave frequencies range from _______. answer :c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. answer :d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. answer :b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. answer :c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. answer :d. Unidirectional Chapter 8 : Telephone, Cable, and Satellite Networks 148. The telephone service handled between two LATAs is called _______. answer :b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? answer :a. 2000 150. The _______ is a device that connects n inputs to m outputs. answer :a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. answer :c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? answer :b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. answer :d. Control unit 154. Which of the following is a time-division switch? answer :a. TSI / b. TDM bus

155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. answer :a. Control unit 156. A telephone network is an example of a _______ network. answer :a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. answer :c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. answer :d. (b) and (c) 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. answer :d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. answer :c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. answer :a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. answer :b. Digital; analog 163. To create a _______, combine crossbar switches in stages. answer :b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. answer :b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. answer :b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. answer :c. Filters 167. The actual bit rate of ADSL downstream data is _______. answer :c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. answer :c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. answer :a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . answer :d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner.

answer :d. CMTS 172. HDSL encodes data using _______. answer :c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. answer :a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. answer :c. Head end 175. A traditional cable TV network transmits signals ______. answer :c. Downstream 176. _______ was designed as an alternative to the T-1 line. answer :c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. answer :b. User data / c. Overhead 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. answer :a. VDSL / b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . answer :c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. answer :a. Modulation / b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. answer :b. 6 182. _______ data go from the subscriber to the Internet. answer :b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. answer :b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. answer :a. SDSL 185. SONET is an acronym for _______ Network. answer :c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. answer :b. Downstream data 187. In a SONET system, _______ can remove signals from a path. answer :a. An add/drop multiplexer Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? answer :c. A single bit is inverted per data unit.

189. Which error detection method uses ones complement arithmetic? answer :b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? answer :c. Simple parity check 191. Which error detection method involves polynomials? answer :a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? answer :c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? answer :c. Single-bit 194. In cyclic redundancy checking, what is the CRC? answer :a. The remainder 195. Which error detection method involves the use of parity bits? answer :a. Simple parity check / b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. answer :b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? answer :c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? answer :c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? answer :b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. answer :d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. answer :d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. answer :c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. answer :a. -0 204. In CRC the quotient at the sender _______. answer :d. Is discarded 205. The Hamming code is a method of _______. answer :a. Error detection / b. Error correction

206. At the CRC checker, _______ means that the data unit is damaged. answer :b. A nonzero remainder 207. Which error detection method can detect a single-bit error? answer :d. All the above 208. Which error detection method can detect a burst error? answer :a. The parity check / b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. answer :c. 0s are Chapter 11 : Wired Local Area Networks 210. HDLC is an acronym for _______. answer :c. High-level data link control 211. Flow control is needed to prevent ________. answer :b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? answer :c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. answer :b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. answer :c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. answer :a. Go-Back-N 216. ARQ stands for _______. answer :a. Automatic repeat request 217. In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the rece iver may send an ACK _______ to the sender. answer :d. Any of the above 218. The shortest frame in HDLC protocol is usually the _______ frame. answer :c. Supervisory 219. The address field of a frame in HDLC protocol contains the address of the _ ______ station. answer :b. Secondary 220. The HDLC _______ field defines the beginning and end of a frame. answer :c. Flag 221. A timer is set when _______ is (are) sent out. answer :c. A data frame 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. answer :c. n

223. What is present in all HDLC control fields? answer :d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. answer :c. Establishing 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. answer :d. Authenticating 226. PAP requires _______ and _______ from the user. answer :c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. answer :b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. answer :d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. answer :a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. answer :b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. answer :d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. answer :b. Address 233. What is the purpose of LCP packets? answer :d. All the above 234. _______ is a three-way handshake for user verification. answer :b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. answer :d. Control 236. In the PPP frame, the _______ field is for error control. answer :a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. answer :c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. answer :c. 8

239. In the _______ random-access method there is no collision. answer :b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . answer :a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. answer :c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . answer :d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. answer :d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. answer :a. 1.0 245. _______ is a random-access protocol. answer :c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. answer :a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. answer :a. 16 248. _______ is a controlled-access protocol. answer :d. Reservation 249. _______ is (are) a channelization protocol. answer :d. All the above 250. _______ is the access protocol used by traditional Ethernet. answer :c. CSMA/CD 251. The most primitive random access method is _______. answer :b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. answer :c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. answer :b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. answer :b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. answer :a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band

s. answer :a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. answer :b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? answer :a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? answer :b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? answer :b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? answer :d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? answer :a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. answer :d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. answer :d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. answer :a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. answer :c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? answer :b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? answer :b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? answer :c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? answer :b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. answer :c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o

riginal signal is 250 MHz, and there are ______ hops per cycle. answer :a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. answer :d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. answer :b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. answer :b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. answer :d. 2.5 277. In an ESS the _______ station is not mobile. answer :b. AP 278. In an ESS the _______ stations are part of a wired LAN. answer :b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. answer :a. No-transition 280. _______ combine to form a scatternet. answer :b. Piconets 281. Bluetooth uses _______ in the physical layer. answer :c. FHSS 282. A _______ frame usually precedes a CTS frame. answer :b. RTS 283. A station with _______ mobility can move from one BSS to another. answer :c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. answer :b. ESS-transition 285. A _______ frame usually precedes an RTS frame. answer :d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. answer :b. More 287. Which MAC sublayer does IEEE 802.11 define? answer :b. PCF / c. DCF 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? answer :c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. answer :d. CSMA/CA

290. FHSS, DSSS, and OFDM are _______ layer specifications. answer :c. Physical 291. Stations do not sense the medium during _______ time. answer :b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. answer :c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. answer :b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. answer :c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. answer :c. Management 296. A Bluetooth network can have _______ master(s). answer :a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. answer :b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). answer :b. Physical (MAC) 299. A _______ is actually a multiport repeater. answer :a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. answer :d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . answer :c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. answer :b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. answer :c. Loops 304. Bridges function in the _______ layer(s). answer :a. Physical (MAC) / b. Data link 305. In a VLAN, stations are separated into groups by _______. answer :a. Software methods 306. A bridge can _______. answer :d. Do all the above 307. A _______ bridge has the smallest ID. answer :d. Root

308. A bridge never forwards frames out of the _______ port. answer :c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? answer :a. Transparent 310. VLAN technology divides a LAN into ______ groups. answer :d. Logical 311. Which of the following is a connecting device? answer :d. All the above 312. Which station characteristic can be used to group stations into a VLAN? answer :d. All the above 313. _______ is a first-generation cellular phone system. answer :c. AMPS 314. AMPS uses _______ for modulation. answer :a. FM / b. FSK 315. _______ separates the AMPS voice channels. answer :c. FDMA 316. _______ is a cellular telephone system popular in Europe. answer :a. GSM 317. D-AMPS uses _______ for multiplexing. answer :b. TDMA / c. FDMA 318. GSM uses _______ for multiplexing. answer :b. TDMA / c. FDMA 319. DSSS is used by the _______ cellular phone system. answer :b. IS-95 320. _______ base stations use GPS for synchronization. answer :b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. answer :a. Teledesic 322. IS-95 has a frequency reuse factor of _______. answer :c. 1 323. The path that a satellite makes around the world is called _______. answer :a. An orbit 324. A GEO satellite has _______ orbit. answer :d. An equatorial 325. Which orbit has the highest altitude? answer :b. GEO 326. _______ is a second-generation cellular phone system. answer :d. All the above 327. A _______ is a computerized center that is responsible for connecting calls

, recording call information, and billing. answer :d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. answer :c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. answer :c. Footprint 330. In _______, a mobile station always communicates with just one base station . answer :c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. answer :d. Between the 332. _______ is often used for navigation purposes. answer :a. GPS 333. An LEO satellite has _______ orbit. answer :b. A polar 334. Teledesic is a _______ LEO satellite system. answer :b. Broadband 335. _______ has 66 satellites in six LEOs. answer :d. Iridium 336. Transmission from the Earth to the satellite is called the _______. answer :b. Uplink 337. The _______ is not used for voice communication. answer :a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. answer :c. VOFR 339. Frame Relay provides _______ connections. answer :a. PVC / b. SVC 340. Routing and switching in Frame Relay are performed by the _______ layer. answer :c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. answer :b. Real-time video 342. The Frame Relay address field is _______ in length. answer :d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. answer :b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. answer :c. LMI 345. Frame Relay operates in the _______. answer :a. Physical and data link layers

346. In the data link layer, Frame Relay uses _______. answer :a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. answer :c. 12 348. In data communications, ATM is an acronym for _______. answer :c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? answer :d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? answer :b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? answer :a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? answer :a. AAL1 353. The VPI of a UNI is _______ bits in length. answer :d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. answer :a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. answer :a. FRAD 356. A _______ provides a connection or a set of connections between switches. answer :b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. answer :b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. answer :a. Router 359. Identify the class of IP address 229.1.2.3. answer :d. Class D 360. On a network that uses NAT, _______ initiates the communication. answer :a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. answer :b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. answer :a. Twenty-five 363. Identify the class of IP address 4.5.6.7. answer :a. Class A

364. Identify the class of IP address 191.1.2.3. answer :b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. answer :a. Nine 366. Class _______ has the greatest number of hosts per given network address. answer :a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? answer :b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. answer :b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? answer :b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? answer :c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? answer :d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. answer :b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. answer :b. The datagram approach to packet switching 374. An IP address consists of _______ bits. answer :b. 32 375. On a network that uses NAT, the router can use _______ global address(es). answer :a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. answer :a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? answer :a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? answer :a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. answer :a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer :a. 201.14.78.64

381. In error reporting the encapsulated ICMP packet goes to _______. answer :c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. answer :c. Time-exceeded 383. An ARP request is _______ to _______. answer :c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? answer :a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. answer :d. All the above 386. An HLEN value of decimal 10 means _______. answer :b. There is 40 bytes in the header 387. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? answer :c. 428 388. If the fragment offset has a value of 100, it means that _______. answer :a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? answer :b. Offset number / c. Total length 390. The IP header size _______. answer :b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. answer :b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? answer :a. Base header / c. Data packet from the upper layer 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. answer :c. ARP 394. A router reads the _______ address on a packet to determine the next hop. answer :c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. answer :c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. answer :a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. answer :c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram?

answer :d. All the above 399. The purpose of echo request and echo reply is to _______. answer :c. Check node-to-node communication 400. An ARP reply is _______ to _______. answer :a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. answer :a. Source-quench 402. A time-exceeded message is generated if _______. answer :b. The time-to-live field has a zero value / c. Fragments of a message d o not arrive within a set time 403. To determine whether a node is reachable, _______ message can be sent. answer :a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. answer :b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? answer :a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer :b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. answer :b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. answer :b. 0 409. A routing table contains _______. answer :d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. answer :a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? answer :c. 1 412. An area border router can be connected to _______. answer :d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? answer :b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. answer :d. PIM-DM; PIM-SM

415. When a multicast router is not directly connected to another multicast rout er, a _______ can be formed to connect the two. answer :d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? answer :a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. answer :b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in answer :b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. answer :c. Broadcast 420. Which type of BGP message announces a route to a new destination? answer :a. Update 421. Which layer produces the OSPF message? answer :d. Network 422. Which of the following is an exterior routing protocol? answer :c. BGP 423. An area is _______. answer :c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? answer :c. n 1 425. Which of the following is an interior routing protocol? answer :a. RIP / b. OSPF 426. OSPF is based on _______. answer :c. Link state routing 427. BGP is based on _______. answer :c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? answer :b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? answer :c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? answer :a. Virtual 431. Which type of BGP message is sent by a router to close a connection? answer :c. Notification

432. An IGMP query is sent from a _______ to a _______. answer :a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? answer :a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. answer :c. Transient 435. In distance vector routing each router receives information directly from _ ______. answer :a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. answer :c. 5 437. _______ is a multicast routing protocol using source-based trees. answer :a. DVRMP / b. MOSPF 438. Pruning and grafting are strategies used in _______. answer :a. RPM 439. In distance vector routing a router sends out information _______. answer :c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. answer :c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. answer :a. Version / b. Type 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. answer :a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. answer :a. Unicast 444. ________ is a multicasting application. answer :d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. answer :c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. answer :d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. answer :b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. answer :a. Group-shared

449. _______ is a multicast routing protocol using group-shared trees. answer :c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. answer :c. RPB 451. Dijkstra's algorithm is used to _______. answer :d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. answer :b. Prune 453. The _______ is used by a router in response to a received-leave report. answer :a. Special query message 454. RIP is based on _______. answer :d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. answer :d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. answer :d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. answer :b. CBT 458. The _______ is an IGMP message. answer :d. All the above 459. The _______ defines the client program. answer :b. Ephemeral port number 460. The _______ timer is used in the termination phase. answer :b. Time-waited 461. Which is a legal port address? answer :d. All the above 462. The definition of reliable delivery includes _______. answer :d. All the above 463. Which of the following does UDP guarantee? answer :d. None of the above 464. The source port address on the UDP user datagram header defines _______. answer :d. The application program on the sending computer 465. A host can be identified by _______ while a program running on the host can be identified by _______. answer :b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? answer :c. Length of header

467. The _______ defines the server program. answer :b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. answer :b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. answer :a. Persistence 470. Connection establishment involves a _______ handshake. answer :a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. answer :a. Persistence 472. The _______ address uniquely identifies a running application program. answer :c. Socket 473. The _______ field is used to order packets of a message. answer :a. Sequence number 474. The _______ field is used for error detection. answer :d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. answer :a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. answer :b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. answer :a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. answer :b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. answer :a. Clark's solution / c. Delayed acknowledgment 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. answer :a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. answer :d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. answer :a. Keep-alive 483. UDP and TCP are both _______ layer protocols. answer :d. Transport 484. Which of the following functions does UDP perform?

answer :b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. answer :d. Port 486. Karn's algorithm is used in calculations by the _______ timer. answer :b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. answer :c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. answer :c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. answer :a. Receiver / c. Congestion 490. _______ traffic features sudden data rate changes in very short periods of time. answer :b. Bursty 491. When the load is greater than the capacity, the delay _______. answer :b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. answer :d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. answer :d. Destination; sender 494. The _______ is the maximum data rate of the traffic. answer :d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. answer :b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. answer :c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. answer :b. The access rate 498. _______ measures the variation in cell transmission time. answer :b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? answer :c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. a. Leaky bucket b. Traffic bucket answer :c. Token bucket

d. Bursty bucket The correct is c 501. A flow-based QoS model designed for IP is called _______. a. RSVP answer :b. Integrated Services c. Differentiated Services d. Multicast trees The correct is b 502. A signaling protocol that helps IP create a flow is called _______. answer :a. RSVP b. Integrated Services c. Differentiated Services d. Multicast trees The correct is a 503. RSVP uses _______ messages. a. Path b. Resv c. Resource answer :d. (a) and (b) The correct is d 504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. a. Fixed answer :b. Shared explicit c. Wild card d. All the above The correct is b 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. a. Stability b. Reservation answer :c. Scalability d. All the above The correct is c 506. A _______ is a Differentiated Services traffic conditioner. a. Meter b. Marker answer :c. Shaper The correct is c 507. What is the relationship between the access rate and the CIR? a. CIR plus Be is equal to the access rate. b. CIR is always equal to the access rate. c. CIR is greater than the access rate. answer :d. CIR is less than the access rate. The correct is d 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. answer :a. CDV b. CLR c. CTD d. CER The correct is a

509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. a. Be answer :b. Bc c. CIR d. (a) and (b) The correct is b 510. The effective bandwidth is based on _______. a. Average data rate b. Peak data rate c. Maximum burst size answer :d. All the above The correct is d 511. The cell _______ is the difference between the CTD maximum and minimum. answer :a. Delay variation b. Error ratio c. Loss ratio d. Transfer delay The correct is a 512. The cell _______ is the ratio of lost cells to cells sent. a. Delay variation b. Error ratio answer :c. Loss ratio d. Transfer delay The correct is c 513. The _______ service class is particularly suitable for applications with bu rsty data. a. CBR answer :b. ABR c. VBR d. UBR The correct is b 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. a. ABR answer :b. CBR c. VBR d. UBR The correct is b 515. The _______ is greater than the SCR. a. MCR b. CVDT answer :c. PCR d. All the above The correct is c 516. The _______ is the fraction of the cells delivered in error. a. CLR answer :b. CER c. CTD d. CDV The correct is b 517. When added to Be, Bc should be less than the _______.

a. CIR b. Committed burst size answer :c. Access rate d. (a) and (b) The correct is c 518. A connectionless iterative server uses _______ ports. answer :a. Well-known b. Ephemeral c. Active d. (a) and (b) The correct is a 519. The _______ socket is used with a protocol that directly uses the services of IP. answer :a. Raw b. Stream c. Datagram d. Remote The correct is a 520. A _______ server serves multiple clients, handling one request at a time. answer :a. Connectionless iterative b. Connectionless concurrent c. Connection-oriented iterative d. Connection-oriented concurrent The correct is a 521. A client issues _______ when it needs service from a server. a. An active request b. A finite open answer :c. An active open d. A passive open The correct is c 522. A _______ server serves multiple clients simultaneously. a. Connectionless iterative b. Connectionless concurrent c. Connection-oriented iterative answer :d. Connection-oriented concurrent The correct is d 523. The server program is _______ because it is always available, waiting for a client request. a. Finite answer :b. Infinite c. Active d. Passive The correct is b 524. A connection-oriented concurrent server uses _______ ports. a. Well-known b. Ephemeral c. Active answer :d. (a) and (b) The correct is d 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? a. One

b. Two c. Three answer :d. Four The correct is d 526. A server program, once it issues _______, waits for clients to request its service. a. An active request b. A finite open c. An active open d. A passive open answer :The correct is d 527. _______ can request a service. a. A socket interface answer :b. A client c. A port d. A server The correct is b 528. _______ can provide a service. a. An iterative server b. A concurrent server c. A client d. (a) and (b) answer :The correct is d 529. The client program is _______ because it terminates after it has been serve d. answer :a. Finite b. Infinite c. Active d. Passive The correct is a 530. _______ processes requests one at a time. answer :a. An iterative server b. A concurrent client c. An iterative client d. A concurrent server The correct is a 531. The _______ socket is used with a connectionless protocol. a. Raw b. Stream answer :c. Datagram d. Remote The correct is c 532. _______ processes many requests simultaneously. a. An iterative server b. A concurrent client c. An iterative client answer :d. A concurrent server The correct is d 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. answer :a. Well-known port b. Infinite port

c. Ephemeral port d. (b) and (c) The correct is a 534. A _______ is an instance of a _______. a. Program; process answer :b. Process; program c. Process; service d. Structure; process The correct is b 535. The _______ socket is used with a connection-oriented protocol. a. Raw answer :b. Stream c. Datagram d. Remote The correct is b 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? a. 107.123.46.0 answer :b. 107.0.0.0 c. 219.46.123.0 d. 107.123.0.0 The correct is b 537. In _______ resolution the client is in direct contact with at most one serv er. a. A cache answer :b. A recursive c. An iterative d. All the above The correct is b 538. In address-to-name resolution the _______ domain is used. a. Reverse b. Generic c. Country answer :d. Inverse The correct is d 539. How is the lifetime of a name-to-address resolution in cache memory control led? a. By the time-to-live field set by the server b. By the time-to-live counter set by the server c. By the time-to-live field set by the authoritative server answer :d. (b) and (c) The correct is d 540. A DNS response is classified as ______ if the information comes from a cach e memory. a. Authoritative b. Recursive answer :c. Unauthoritative d. Iterative The correct is c 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) a. Fourth

answer :b. Fifth c. Third d. Not enough information given The correct is b 542. A DNS _______ server's zone is the entire DNS tree. a. Secondary answer :b. Root c. Primary d. All the above The correct is b 543. To find the IP address of a host when the domain name is known, the _______ can be used. answer :a. Inverse domain b. Generic domains c. Country domains d. (b) or (c) The correct is a 544. A DNS _______ server gets its data from another DNS server. a. Root b. Primary answer :c. Secondary d. All the above The correct is c 545. A DNS _______ server creates, maintains, and updates the zone file. a. Root answer :b. Primary c. Secondary d. All the above The correct is b 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) a. Fourth b. Fifth c. Third answer :d. Not enough information given The correct is d 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. a. fhda answer :b. edu c. chal d. atc The correct is b 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. a. Fhda answer :b. chal c. atc d. edu The correct is b 549. In _______ resolution the client could directly contact more than one serve r. answer :a. An iterative b. A cache

c. A recursive d. All the above The correct is a 550. Which of the following domain names would most likely use a country domain to resolve its IP address? a. chal.atac.fhda.edu answer :b. kenz.acct.sony.jp c. gsfc.nasa.gov d. mac.eng.sony.com The correct is b 551. A resolver is the _______. a. Host machine answer :b. DNS client c. DNS server d. Root server The correct is b 552. Which of the following is true? a. FTP allows systems with different directory structures to transfer files. b. FTP allows a system using ASCII and a system using EBCDIC to transfer files. c. FTP allows a PC and a SUN workstation to transfer files. answer :d. All the above are true. The correct is d 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? a. Multipart/parallel b. Multipart/digest c. Multipart/alternative answer :d. Multipart/mixed The correct is d 554. During an FTP session the control connection is opened _______. a. As many times as necessary answer :b. Exactly once c. Exactly twice d. All the above The correct is b 555. The purpose of the MTA is _______. answer :a. Transferral of messages across the Internet b. Message preparation c. Envelope creation d. (a) and (b) The correct is a 556. In anonymous FTP, the user can usually _______. a. Store files answer :b. Retrieve files c. Navigate through directories d. Do all the above The correct is b 557. Which part of the mail created by the UA contains the sender and receiver n ames? answer :a. Header b. Body c. Envelope d. Address

The correct is a 559. The _______ field in the MIME header uses text to describe the data in the body of the message. a. Content-transfer-encoding answer :b. Content-Id c. Content-type d. Content-description The correct is b 560. The _______ field in the MIME header describes the method used to encode th e data. a. Content-Id b. Content-description c. Content-type answer :d. Content-transfer-encoding The correct is d 561. The _______ field in the MIME header has type and subtype subfields. a. Content-transfer-encoding answer :b. Content-type c. Content-Id d. Content-description The correct is b 562. A JPEG image is sent as email. What is the content-type? a. Multipart/mixed b. Multipart/image c. Image/basic answer :d. Image/JPEG The correct is d 563. The purpose of the UA is _______. a. Message preparation b. Envelope creation c. Transferral of messages across the Internet answer :d. (a) and (b) The correct is d 564. The _______ field in the MIME header is the type of data and the body of th e message. a. Content-Id b. Content-description answer :c. Content-type d. Content-transfer-encoding The correct is c 565. A message is fragmented into three email messages. What is the content-type ? answer :a. Message/partial b. Multipart/partial c. Multipart/mixed d. Message/RFC822 The correct is a 566. A client machine usually needs _______ to send email. a. Only POP b. Both SMTP and POP answer :c. Only SMTP

d. None of the above The correct is c 567. In FTP, what attributes must be defined by the client prior to transmission ? a. Data type b. File structure c. Transmission mode answer :d. All the above The correct is d 568. In FTP, there are three types of _______: stream, block, and compressed. a. Data structures answer :b. Transmission modes c. Files d. All the above The correct is b 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. a. Data structure b. Transmission mode answer :c. File type d. All the above The correct is c 570. In FTP, when you _______, it is copied from the server to the client. a. Retrieve a file b. Store a file c. Retrieve a list answer :d. (a) and (c) The correct is d 571. In FTP, when you _______, it is copied from the client to the server. a. Retrieve a file answer :b. Store a file c. Retrieve a list d. (a) and (c) The correct is b 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? a. Multipart/digest b. Multipart/alternative c. Multipart/mixed answer :d. Multipart/parallel The correct is d 573. During an FTP session the data connection is opened _______. a. Exactly once b. Exactly twice answer :c. As many times as necessary d. All the above The correct is c 574. Which of the following is a retrieval method? a. HTTP b. FTP c. TELNET answer :d. All the above The correct is d

575. A request message always contains _______. a. A status line, a header, and a body b. A status line and a header c. A header and a body answer :d. A request line and a header The correct is d 576. Which of the following is present in both a request line and a status line? a. URL b. Status code answer :c. HTTP version number d. Status phrase The correct is c 577. Which of the following is not a client program in WWW? a. FTP b. HTTP answer :c. HTML d. TELNET The correct is c 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. answer :a. PUT b. GET c. POST d. COPY The correct is a 579. The _______ header can specify the client configuration and the client's pr eferred document format. answer :a. Request b. Response c. General d. Entity The correct is a 580. The _______ tags enclose binary code or byte code. answer :a. Executable contents b. Image c. List d. Hyperlink The correct is a 581. Which type of Web document is run at the client site? a. Dynamic answer :b. Active c. Static d. All the above The correct is b 582. HTTP has similarities to both _______ and _______. a. FTP; MTV b. FTP; URL c. FTP; SNMP answer :d. FTP; SMTP The correct is d 583. A user needs to send the server some information. The request line method i

s ______. a. OPTION answer :b. POST c. PATCH d. MOVE The correct is b 584. A response message always contains _______. a. A header and a body b. A status line, a header, and a body answer :c. A request line and a header d. A status line and a header The correct is c 585. The _______ header supplies information about the body of a document. a. General b. Request answer :c. Entity d. Response The correct is c 586. The _______ header can specify the server configuration or provide informat ion about a request. a. General b. Request answer :c. Response d. Entity The correct is c 587. Hypertext documents are linked through _______. a. TELNET answer :b. Pointers c. DNS d. Homepages The correct is b 588. Which of the following is an interpreter? a. CGI b. FTP c. HTTP answer :d. HTML The correct is d 589. What are the components of a browser? answer :a. Controller, client program, interpreter b. Retrieval method, host computer, path name c. Hypertext, hypermedia, HTML d. All the above The correct is a 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. answer :a. GET b. HEAD c. POST d. PUT The correct is a 591. Which type of Web document is fixed-content and is created and stored at th e server site?

a. Dynamic b. Active answer :c. Static d. All the above The correct is c 592. The _______ of a Web page contains the title and parameters used by the bro wser. a. Attributes b. Tags answer :c. Head d. Body The correct is c 593. Which type of Web document is created at the server site only when requeste d by a client? a. Active b. Static answer :c. Dynamic d. All the above The correct is c 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. a. The head b. The body c. A tag answer :d. An attribute The correct is d 595. A user wants to copy a file to another location; the request line contains the _______ method. a. PUT b. PATCH answer :c. COPY d. POST The correct is c 596. What does the URL need to access a document? a. Path name b. Host computer c. Retrieval method answer :d. All the above The correct is d 597. Which type of Web document is transported from the server to the client in binary form? answer :a. Active b. Static c. Dynamic d. All the above The correct is a 598. An ending tag is usually of the form _______ a. <tagname> b. <tagname!> answer :c. </tagname> The correct is c 599. An applet is a small application program written in _______ a. Shell script

answer :b. Java c. C d. C++ The correct is b 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. a. Passive answer :b. Dynamic c. Active d. Static The correct is b 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. a. Passive answer :b. Dynamic c. Active d. Static The correct is b 602. A user needs to move a file to another location. The request line method is _______. a. PATCH answer :b. MOVE c. PUT d. GET The correct is b 603. Which category of HTML tags allows the listing of documents? a. Image b. Hyperlink answer :c. List d. Executable contents The correct is c 604. A program can use _______ to write a CGI program. a. Bourne shell script b. Perl c. C answer :d. Any of the above The correct is d 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. a. Passive b. Dynamic c. Active answer :d. Static The correct is d 606. The server receives input from a browser through _______. a. An attribute answer :b. A form c. A tag d. Any of the above The correct is b 607. Output from a CGI program is _______. a. Text

b. Graphics c. Binary data answer :d. Any of the above The correct is d 608. _______ is used to enable the use of active documents. a. CGI b. Java answer :c. HTML d. All the above The correct is c 609. Java is _______. a. A programming language b. A run-time environment c. A class library answer :d. All the above The correct is d 610. An applet is _______ document application program. answer :a. An active b. A passive c. A static d. A dynamic The correct is a 611. In a real-time video conference, data from the server are _______ to the cl ient sites. a. Unicast b. Broadcast answer :c. Multicast d. None of the above The correct is c 612. A _______ adds signals from different sources to create a single signal. answer :a. Mixer b. Translator c. Timestamp d. Sequence number The correct is a 613. The RTCP _______ message shuts down a stream. a. Application-specific b. Source description answer :c. Bye d. Farewell The correct is c 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. a. SIP answer :b. H.323 c. IEEE 802.3 d. V.90bis The correct is b 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. a. Timestamp b. Sequence number

c. Mixer answer :d. Translator The correct is d 616. An RTP packet is encapsulated in a(n) _______. a. IP datagram b. RTCP packet answer :c. UDP user datagram d. TCP segment The correct is c 617. The last step in JPEG, _______, removes redundancies. a. Blocking answer :b. Compression c. Quantization d. Vectorization The correct is b 618. A _______ shows when a packet was produced relative to the first or previou s packet. a. Sequence number b. Threshold answer :c. Timestamp d. Playback buffer The correct is c 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). a. H.245 b. H.225 c. H.323 answer :d. Q.931 The correct is d 620. TCP is not suitable for real-time traffic because _______. a. There is no provision for timestamping b. There is no support for multicasting c. Missing packets are retransmitted answer :d. All the above The correct is d 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. a. Quantization b. Vectorization c. Blocking answer :d. The DCT The correct is d 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. a. Sender b. QoS answer :c. Receiver d. Passive The correct is c 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. a. DCT

answer :b. SIP c. RTCP d. JPEG The correct is b 624. For streaming stored audio/video, the _______ holds information about the a udio video file. a. Jitter b. Alpha file c. Beta file answer :d. Metafile The correct is d 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. a. TCP/IP answer :b. RTSP c. HTTP d. SIP The correct is b 626. The audio/video stream is sent by the media server to the _______. answer :a. Media player b. Browser c. Web server d. None of the above The correct is a 627. Voice over IP is a(n) ________ audio/video application. answer :a. Interactive b. Streaming stored c. Streaming live d. None of the above The correct is a 628. _______ is a SIP message type. a. INVITE b. CANCEL c. OPTIONS answer :d. All the above The correct is d 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. a. Proxy server b. Registrar server c. Media server answer :d. (a) and (b) The correct is d 630. _______ are used to number the packets of a real-time transmission. a. Translators b. Timestamps c. Playback buffers answer :d. Sequence numbers The correct is d 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. a. CVF

b. CSM answer :c. ECB mode d. CBC mode The correct is c 632. In the public-key method of cryptography, which key is publicly known? answer :a. Encryption key only b. Decryption key only c. Both d. None of the above The correct is a 633. A cipher is _______. a. An encryption algorithm b. A decryption algorithm c. A private key answer :d. (a) or (b) The correct is d 634. Before a message is encrypted, it is called _______. a. Ciphertext b. Cryptotext c. Cryptonite answer :d. Plaintext The correct is d 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. answer :a. 190 b. 200 c. 19 d. 20 The correct is a 636. The _______ is an example of polyalphabetic substitution. a. P-box answer :b. Vigenere cipher c. S-box d. Product block The correct is b 637. In the symmetric-key method of cryptography, which key is publicly known? a. Encryption key only b. Decryption key only c. Both answer :d. None of the above The correct is d 638. The RSA algorithm uses a _______ cryptography method. a. Private-key b. Symmetric-key c. Denominational answer :d. Public-key The correct is d 639. The _______ is a block cipher. a. P-box b. S-box c. Product block answer :d. All the above

The correct is d 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. a. Monoalphabetic substitution b. Transposition answer :c. Polyalphabetic substitution d. None of the above The correct is c 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. a. ECB mode b. CBC mode c. CFM answer :d. All the above The correct is d 642. An initialization vector is needed in the _______. a. CSM b. CBC mode c. CVF answer :d. (a) and (b) The correct is d 643. In the public-key method of cryptography, only the receiver has possession of the _______. a. Public key b. Both keys answer :c. Private key d. None of the above The correct is c 644. After a message is decrypted, it is called _______. a. Ciphertext b. Cryptotext c. Cryptonite answer :d. Plaintext The correct is d 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. a. Polyalphabetic substitution b. Transpositional answer :c. Monoalphabetic substitution d. None of the above The correct is c 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. a. KDC answer :b. X.509 c. CA level 1 d. Kerberos The correct is b 647. Windows 2000 uses an authentication protocol called _______. a. Otway-Rees answer :b. Kerberos c. Diffie-Hellman

d. Needham-Schroeder The correct is b 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. a. His or her own public key answer :b. His or her own private key c. His or her own symmetric key d. The receiver's private key The correct is b 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. a. TLS b. Firewall c. CA answer :d. KDC The correct is d 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. a. Return answer :b. Replay c. Man-in-the-middle d. Bucket brigade The correct is b 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. answer :a. Needham-Schroeder b. Diffie-Hellman c. Otway-Rees d. Kerberos The correct is a 652. If user A wants to send an encrypted message to user B, the plaintext is en crypted with the public key of _______. a. The network b. User A answer :c. User B d. (a) or (b) The correct is c 653. When symmetric-key encryption is combined with private-key encryption, the _______ key is encrypted with the public key. a. Skeleton b. Private c. Public answer :d. Symmetric The correct is d 654. The _______ issues tickets for the real server. a. Real server b. Data server answer :c. AS d. TGS The correct is c 655. In _______-key cryptography, everyone has access to all the public keys. a. Private

b. Certified answer :c. Symmetric d. Public The correct is c 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. answer :a. The sender's public key b. Her or his own symmetric key c. Her or his own private key d. Her or his own public key The correct is a 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. a. Ticket b. Realm answer :c. Nonce d. Public key The correct is c 658. A _______ certifies the binding between a public key and its owner. a. KDC b. TLS answer :c. CA d. Firewall The correct is c 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. a. 90 b. 10 c. 20 answer :d. 45 The correct is d 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. a. Needham-Schroeder b. Otway-Rees answer :c. Diffie-Hellman d. Kerberos The correct is c 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. a. Bucket-in-the-middle b. Replay c. Return answer :d. Man-in-the-middle The correct is d 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. a. PKI b. TGS answer :c. KDC d. CA The correct is c

663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. a. Needham-Schroeder b. Diffie-Hellman c. Otway-Rees answer :d. Kerberos The correct is d 664. The _______ is the KDC in the Kerberos protocol. a. Real server b. Data server answer :c. AS d. TGS The correct is c 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. a. Authentication data answer :b. SPI c. Padding d. Sequence number The correct is b 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. a. Encapsulated in another datagram; encrypted answer :b. Encrypted; encapsulated in another datagram c. Authenticated; encrypted d. Encrypted; authenticated The correct is b 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. a. PGP b. ESP c. IPSec answer :d. AH The correct is d 668. An _______ is a private network with no external access that uses the TCP/I P suite. a. Internet answer :b. Intranet c. internet d. Extranet The correct is b 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. a. PGP b. TLS c. AH answer :d. SA The correct is d 670. An _______ is a private network with limited external access that uses the TCP/IP suite. a. Intranet answer :b. Extranet c. Internet

d. internet The correct is b 671. The handshake protocol and data exchange protocol are part of _______. answer :a. TLS b. CA c. KDC d. SSH The correct is a 672. _______ is a collection of protocols that provide security at the IP layer level. a. TLS b. SSH answer :c. IPSec d. PGP The correct is c 673. A method to provide for the secure transport of email is called _______. a. TLS answer :b. PGP c. SA d. IPSec The correct is b 674. A VPN uses _______ to guarantee privacy. a. IPSec b. Tunneling answer :c. Both (a) and (b) d. None of the above The correct is c 675. A _______ can forward or block messages based on the information in the mes sage itself. a. Message digest answer :b. Proxy firewall c. Packet-filter firewall d. Private key The correct is b 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. a. AH b. PGP c. IPSec answer :d. ESP The correct is d 677. _______ is a transport layer security protocol. a. PGP b. IPSec answer :c. TLS d. AH The correct is c 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. answer :a. Protocol b. Security parameter index c. Sequence number

d. Next-header The correct is a 679. A _______ network is totally isolated from the global Internet. answer :a. Private b. Hybrid c. Virtual private d. Any of the above The correct is a 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. a. Private answer :b. Hybrid c. Virtual private d. Any of the above The correct is b 681. In a VPN, _______ encrypted. a. The inner datagram is b. Neither the inner nor the outer datagram is c. The outer datagram is answer :d. Both inner and outer datagrams are The correct is d 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. a. Proxy firewall b. Message digest answer :c. Packet-filter firewall d. Private key The correct is c 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer :Default gateway 2. Why was the OSI model developed? Answer :standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer :DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer :bits 5. Which protocol below operates at the network layer in the OSI model? Answer :All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer :removed 7. Session layer of the OSI model provides Answer :Dialog control 8. IPv6 has _______ -bit addresses. Answer :128 9. Which one of the following functionalities isn\'t provided by TCP? Answer :Addressing 10. Which of the following can be an Ethernet physical address? Answer :07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer :32 1. The maximum number of nodes per segment depends on the_______.?

Answer :Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer :Two 3. IEEE designates Thicknetas_______Ethernet Answer : 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer :Protocol 5. Which is not an exmple of transmission media? Answer :None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer :Heavy use 7. How many layers in the OSI model? Answer :7 8. Which device act as a traffic cop? Answer :Router 9. What is SMTP? Answer :Simple mail transport protocol 10. An organization that share devices, saves Answer :All of the above. 11. The computer you are controlling or working via a network. Answer :remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer :Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer :Presentaion layer 14. E-mail use communication protocol. Answer :SMTP 15. What is the default port number for SMTP? Answer :25 16. What is the default port number for FTP? Answer : 21 17. What is the default port number for Web server such as IIS and Apache? Answer :80 18. HTTP is the protocol use to view web pages. Answer :True 19. Which cannot support full-duplexing? Answer :100BaseT4 20. Vertical connectors between floors are known as_______. Answer :Riser The _______ defines the client program. Answer :A) B) C) Well-known port number

Ephemeral port number IP address

D) Physical address 2 INCORRECT The _______ timer is used in the termination phase. Answer :A) Retransmission

B) C)

Time-waited Persistence

D) Keep-alive 3 INCORRECT Which is a legal port address? A) B) 0 513 65,535

Answer :C)

D) All the above 4 INCORRECT The definition of reliable delivery includes _______. A) B) Error-free delivery Receipt of the complete message In-order delivery

Answer :C)

D) All the above 5 INCORRECT Which of the following does UDP guarantee? A) B) Acknowledgments to the sender Flow control Sequence numbers on each user datagram

Answer :C)

D) None of the above 6 INCORRECT The source port address on the UDP user datagram header defines _______. A) B) The sending computer The receiving computer The application program on the receiving computer

Answer :C)

D) The application program on the sending computer 7 INCORRECT A host can be identified by _______ while a program running on the host can be identified by _______.

Answer :A) B) C)

A port number; an IP address

An IP address; a port number An IP address; a host address

D) An IP address; a well-known port 8 INCORRECT Which of the following is not part of the UDP user datagram hea der? A) Source port address Checksum

Answer :B) C)

Length of header

D) Destination port address 9 INCORRECT The _______ defines the server program. Answer :A) B) C) IP address

Well-known port number Ephemeral port number

D) Physical address 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer :A) B) C) Process-to-process; node-to-node

Host-to-host; process-to-process Process-to-process; host-to-host

D) Node-to-node; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer :A) B) C) Persistence

Keep-alive Retransmission

D) Time-waited 12 CORRECT Connection establishment involves a _______ handshake. Answer :A) B) C) One-way Two-way Three-way

D) None of the above 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer :A) B) C) Persistence

Transmission Keep-alive

D) Time-waited 14 INCORRECT The _______ address uniquely identifies a running application program. A) IP address NIC

Answer :B) C) Socket

D) Host 15 INCORRECT The _______ field is used to order packets of a message. A) B) Sequence number Acknowledgment number Urgent pointer

Answer :C)

D) Checksum 16 INCORRECT The _______ field is used for error detection. A) B) Sequence number Acknowledgment number Urgent pointer

Answer :C)

D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer :A) B) C) 6 8 4

D) 2 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. Answer :A) B) C) Control Offset Sequence number

D) Reserved 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer : B) C) A) Silly window syndrome

Sliding window syndrome Nagle's syndrome

D) Delayed acknowledgment 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer :A) B) C) Time-waited

Retransmission Persistence

D) Keep-alive 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. A) Clark's solution

B)

Nagle's algorithm Delayed acknowledgment

Answer :C)

D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer :A) B) C) Nagle's algorithm

Clark's solution Delayed acknowledgment

D) (a) or (c) 23 INCORRECT An ACK number of 1000 always means that _______. A) B) Answer : 999 bytes has been successfully received 1000 bytes has been successfully received C) 1001 bytes has been successfully received

D) None of the above 25 INCORRECT UDP and TCP are both _______ layer protocols. A) B) Physical Data link Network

Answer :C)

D) Transport 26 INCORRECT Which of the following functions does UDP perform? Answer :A) B) C) End-to-end reliable data delivery

Process-to-process communication Host-to-host communication

D) All the above 27 INCORRECT UDP needs the _______ address to deliver the user datagram to the correct application program.

A) B)

Application Internet Physical

Answer :C)

D) Port 28 INCORRECT Karn's algorithm is used in calculations by the _______ timer. Answer :A) B) C) D) Time-waited

Retransmission Persistence Keep-alive

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer :NIC driver Operating system driver System driver Protocol driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? CPU Software driver ISA interface Answer :EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer :UTP Twinax Fiber-optic Coax 4. You are running UTP cable in an Ethernet network from a workstation to a hub. Wh ich of the following items is/are included in the total length measurement of th e cable segment (as needed in determining the longest segment length)? (Choose a ll that apply.) Answer :Workstation patch cable Answer :Main cable run Hub internal network Answer :Hub patch cable 5. If you were going to make a 10BaseT patch cable, which tool would you use? Screwdriver

Punchdown tool Answer :Wire crimper Tone generator 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) BNC Answer :DB-25 Answer :Centronics-50 RJ-11 IBM Data Connector 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? netstat Answer :MSD Ping utility All of the above 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Bridge Router Answer :Repeater Brouter 9. A bridge can increase network efficiency by _____________________. Copying packets of data sent to storage and resending them as requested without rereading the needed data Answer :Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment Defining traffic order by using Quality of Service (QoS) All of the above 10. What is the result of updating an old NIC driver on a system? Answer :It can correct bugs. It can be a good way to look like you are doing useful work. It can act as a protocol converter. All of the above. 11. EEPROM is short for ________________________________________. Electronically erasable programmable read-only memory Answer :Electrically erasable programmable read-only memory Electronically erasable periodical only memory Electrically erasable powered read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. PCI Token Ring Answer :Legacy ISA EISA

13. A brouter combines which functions? (Choose all that apply.) Answer :Router Answer :Bridge Gateway Repeater 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? RJ-11 Answer :BNC RJ-45 All of the above 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Wire crimper Punchdown tool Media tester Answer :Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? UTP STP Answer :Coax Fiber-optic 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer :Print server Print facilitator PCONSOLE.EXE Print manager 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Surge Answer :Spike Brownout Blackout 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer :Surge Spike Brownout Blackout 20. Which power condition occurs when the voltage level drops below 120 volts and st

ays below for an extended period of time? Surge Spike Answer :Brownout Blackout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) It has centralized security and administration. Answer :A computer can be both a client and a server. Answer :A limited number of computers are involved. It does not require a hub. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. RG-47 Answer :RG-58 RG-59 RG-62 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) It does not require a hub. A computer can be both a client and a server. Answer :It has centralized security and administration. Answer :It has a centralized backup. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. 0 1 Answer :2 3 5. Which of the following is characteristic of a mesh network? It controls cable costs. Answer :It offers improved reliability. It is required by fire code. It needs a token to operate. 6. Which type of network topology uses terminators? Star Answer :Bus Ring Mesh 7. Which of the following best describes a star topology? Answer :It has centralized management. Any cable fault halts all network traffic. It uses less cable than a bus or ring. It is always completely wireless. 8. A client/server approach uses what type of security model? Answer :Centralized Decentralized Server Distributed 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Screws DIX Answer :Vampire Taps Bolts 10. Plenum cable has which of the following characteristics? It has a lower cost than PVC. Answer :It meets fire codes.

It transmits data faster. All the above. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? STP Answer :UTP Coax Fiber-optic 12. Which of the following has the highest possible throughput? STP UTP Coax Answer :Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? 100BaseVG 10BaseF 100BaseT4 Answer :100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Duplex communications Baseband communications Sideband communications Answer :Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? NAS devices have smaller monitors. Answer :NAS devices are less expensive. NAS devices contain more storage. All the above. 16. An RJ-45 connector should be wired with ____________________ pairs when used on a Category 5 UTP cable. 1 2 Answer :4 8 17. Thicknet can be extended to ___________________ meters per segment. 100 200 Answer :500 1000 18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Gateway T1 modem Answer :CSU/DSU Switch 19. Failure to terminate a bus topology properly will result in _________. Electrical shock hazard Answer :Unwanted signal echo Fire hazard All the above 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Router Answer :NIC Gateway BNC connector

In OSI model, as data packet moves from the lower to the upper layer header are.. Answer :Removed There are two broad classes of packet-switched networks are: Answer :datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer :Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer :Virtual-circuit network Answer :Datagram network Which statement is correct for layering in OSI model Answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer :TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer :Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer :Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer :L/R Which one is correct about P2P network? Answer :A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer :TCP _____ provides reliable, in-order transfer of bytes between client and server Answer :TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer :Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer :The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer :All of the other SMTP stands for Answer :Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer :TCP . 20 and 21 IMAP and POP are_________ Answer :Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer :MIME TCP provides __________between application processes running on different hosts Answer :Logical communications What is WRONG about UDP? Answer :Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer :Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest

ion window increases exponentially until timeout Answer :Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer :136 Which one is correct about TCP and UDP? Answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer :FIN The difference between flow control and congestion control is primarily Answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel TCP is a ___________ protocol. Answer :Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer :First What is the data unit used in Internet Protocol (IP)? Answer :Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer :Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer :32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer :All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer :2 Traceroute command uses Answer :ICMP RIP (Routing Information Protocol) in the Internet uses Answer :Distance vector routing algorithm Routers operate in the _______ layers. Answer :network Dijkstra s algorithm is Answer :A link-state routing algorithm Distance vector routing algorithm requires Answer :all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer :0000 ______ is (are) (an) example(s) of random access MAC Answer :All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer :the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer :Wireless LAN What is store-and-forward operation in switches? Answer :They receive the whole frame before forwarding to next station ______is used in Ethernet Answer :CSMA/CD Which one is the flag used for framing in PPP

Answer :01111110 Which one can be a MAC address? Answer :00-D0-56-F2-B5-12 ARP stands for _________ Answer :Address Resolution Protocol Parity checking _____. Answer :can detect a single bit error in a transmission At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer :0s are a CRC remainder is What type of routing algorithm that OSPF use? Answer :Shortest Path Routing Multicast Routing Distance Vector Routing Link State Routing The bytes of data being transferred in each connection are numbered by TCP. The number starts with a none is correct answer :randomly generated number 1 0 The ___ model shows how the network functions of a computer ought to be organize d. Answer :OSI CCITT ANSI ISO ___ audio/video refers to on-demand request for compressed audio/video files. Answer :Streaming live Interactive None is correct Streaming stored The physical layer is concerned with the movement of ___ over the physical mediu m. protocols dialogs answer :bits programs What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? OSPF IGRP Answer :DHCP HTTP If ASCII character H is sent and the character I is received, what type of error s is this? burst single-bit recoverable answer :multiple-bit

HDLC is a ___ protocol character-oriented count-oriented byte-oriented answer :bit-oriented An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? 18.874 sec 1.887 sec 337 sec answer :18874 sec What flag is used to close TCP connection? Answer :FIN SYN ACK PSH What type of routing protocol that BGP is? Link State Routing Shortest Path Routing Multicast Routing Answer :Distance Vector Routing A bridge has access to the ___ address of a station on the same network. port physical answer :none is correct logical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer :none is correct physical network transport With WWW as an example of client-server computer software, the client is: all are correct answer :The machine that you use to display WWW documents The machine that you use to store WWW documents The machine that makes WWW documents available Routers function in the ___ layers. none is correct physical and data link data link and network answer :physical, data link, and network The purpose of MTA is Message preparation Envelope creation Answer :Transferal of message across the Internet a and b A ___ document is created by a Web server whenever a browser requests the docume nt dynamic static

answer :Active None is correct What type of service that VC network provides? Answer :Connection-oriented Connectionless Connection-oriented and Connectionless None is correct A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer :6.5% 13.1% 2.6% 0.8% ___ is more powerful and complex than ___ Answer :IMAP4; POP3 POP3; IMAP4 SMTP; POP3 None is correct TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. message; message none is correct block; block answer :stream; stream TCP uses ___ to check the safe and sound arrival of data. out of band signaling none is correct the services of another protocol answer :an acknowledgment mechanism In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are___ rearranged modified added answer :removed Which IP option is used if exactly four specific router are to be visited by the datagram? record route answer :strict source route loose source route none is correct What is the service that the UDP protocol provides? Answer :guaranteed delivery error detection none is correct flow control In the OSI model, encryption and decryption are function of the ___ layer. session application answer :presentation transport Which device can amplify and make free- noise signal to all computer in LAN? router repeater answer :all three devices switch

What is information used to route packet in network? Answer :destination address and source address fields in IP header source address field in IP header destination addressfield in IP header destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___ speeds up the slower process none is correct slows down the faster process answer :uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. 10BASE-T 10BASE5 10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is circuit-switched one is Network Layer, one is Transport Layer one is Transport Layer, one is Session Layer answer :one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a variable-length block none is correct answer :a fixed number of blocks a fixed-length In ___ resolution, the resolver expects the server to supply the final . none is correct straight answer :recursive iterative By default, FTP uses which ports? 25 and 110 80 and 81 20 and 21 Answer :80 and 8080 Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? ITU-T Answer :EIA ANSI ISO In the OSI model, which layer functions as a liaison between user support layers and network support layers? Physical layer Network layer Answer :Transport layer Session layer The Physical layer is connected with the movement of____over the physical medium . Answer :Bits Dialogs Protocols Programs Which of the following statement is correct? Full-Duplex: Communications that can go only one direction Answer :Full-Duplex: Communications in which both sender and receiver can send a

t the same time Half-Duplex: Communications in which both sender and receiver can send at the sa me time Half-Duplex: Communications that can go only one direction What is the purpose of the IEEE 802 commitlee? Answer :To develop LAN standards To define some protocols for routing To develop IPv6 standard layers for internetworking connection To define seven standard layers for internetwork connection MAN stands for? Multi-Access Network Major Area Network Metropolitan Area Network Multi-Access Node In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Added Answer :Removed Rearranged Modified Which of the following is an appropriate description concerning B2C? Answer :Ordering books online Government distributing tax forms electronically File sharing Car manufacturer ordering tires from supplier Which of the following is an appropriate description concerning mobile network u sers? Answer :A notebook computer used in a class Desktop computers in offices Server computers in ISP Networks in order, unwired buildings In the OSI model, encryption and decryption are functions of the_____layer. Application Session Transport Answer :Presentation Quiz Chapter3 If ASCII character G is sent and the character D is received, what type of error is this? Recoverable Single-bit Multiple-bit Answer :Burst The purpose of ICMP echo request end ICMP echo reply is to . Answer :report errors in the resource records of DNS, which record is also known as an alias hostname? Answer :CNAME record Which of the following is characteristic of packet switching? Answer :Bandwidth shared. How does the HTTP protocol implement caching? Answer :using proxy server. What begins an Ethernet frame? Answer :Preamble.

The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer :All of the others What is information in IP header used to route packet in router? Answer :Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer :ICMP messages Which of the following is the MAC protocol? Answer :CSMA/CD The signaling protocol is used in: Answer :Internet The HTTP request line contains a method to request a document from the server. Answer :GET Which of the following is the pipelining protocol: Answer :Automatic Repeat Request An HTTP request message always contains . Answer :a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer :10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer :CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer :Transport layer. How many duplicate ack-numbers triggartha Fast Retransmission mode? Answer :No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer :Multiple channels Which of the following describe the DHCP Discover message? Answer :It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer :Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer :F The default mode of HTTP 1.1 is ___ Answer :Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer :process identifier The receiver window is found in ____ Answer :only ACKs

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer :165 What is the name of the packets processed at the network layer? Answer :Datagram Which of the following is hybrid of client-server and P2P? Answer :Skype What is the protocol used to obtain email from to an email server: Answer :IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer :Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer :MX record What is the MAC protocol used in 802.11 network? Answer :CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer :retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer :129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer :no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer :201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer :CSMA/CD Your normal PC requests a DNS to do a search: Answer :recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer :authoritative A switch processes up to which layer? Answer :Transport ______ uses dedicated links directly connected from end-to-end Answer :Circuit switched network Suppose that host 10.0.0.2 initiates a connection, using source port 5500 to a W eb server listening at port 80 at 128.119.40.186. The NAT translation table for this TCP connection. WAN side LAN side

138.76.29.7, 5002 10.0.0.2, 5500 What are the destination IP addresses and port numbers on the IP datagram arrivi ng to the WAN side of the router with interface address 138.76.29.7? Answer :Destination IP: 128.119.40.186, Destination Port: 80. This command identifies the receiver cf the message. Answer :RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . answer :this is the last fragment. Which of the following is NOT a message of DHCP? Answer :DHCP response Which of the following is the service of link layer'? Answer :Error detection which the following is the individual characteristic of rdt3.0? answer :Sequence number added to packet. An process-to-process communication up to which layer? Answer :Transport Which the following is the individual characteristic of switch? Answer :Maintain a routing table. Which transport layer was first used for streaming media? Answer :UDP Most Internet services and intelligence is located: Answer :in ISPs The backbone ofthe Internet is run by: Answer :Tier-1 ISPs The core of the Internet consiste of: Answer :Ethernet What is the function of ARP? Answer :It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer :Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 10010101 and 10101010. Answer :00111111 What is the framming method used in PPP? Answer :Byte stuffing UDP is called a __________ transport protocol. Answer :connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer :011

Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer :UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer :The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer :Streaming live The second phase of JPEG is_______ Answer :Quantization In the DNS, the names are defined in structure Answer :an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer :32 subnets and 8 hosts In ______ resolution, the resolver expects the server to supply the final Answer :Recursive What is the combination of an iP address and a port number called? Answer :A socket NAT used at the router to Answer :translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer :Faster than the TCP In the OSI model, which of the following is an application layer service? Answer :all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer :Control What are general functions of router? Answer :All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer :uses buffers A user needs to send the server some information. The request line method is__ Answer :POST The purpose of MTA (Mail Transfer Agent) is Answer :Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer :base64

NAT table in router Answer :Store pairs of the IP address of the host with the port number in form o f (IP address, port Answer:) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer :TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer :the original sender Whic h of the following statement is correct? Answer :Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer :Time-to-Live (TTL) What does NAT stand for? Answer :Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer :Port number Jitter is introduced in real-time data by the_____ Answer :Difference of the delay among packets Bridges work in the layers. Answer :physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer :2,6% What is the data unit used in Internet Protocol (IP)? Answer :Datagram An HTTP request message always contains________ Answer :a request line and a header DNS can use the services of _____ using the well-known port 53, Answer :UDP The _____domains define registered hosts according to their generic behavior, Answer :Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer :First A set of rules which is used by computers to communicate with each other across a network is called___ Answer :Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer :Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network?

Answer :255.255.255.0 The OSI model consists of ____ layers, Answer :Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer :Reduces to 1 Parity checking____ Answer :can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer :parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer :Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer :None of these Flow control_____ Answer :ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer :To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer :x^5+x^2+1 This command identifies the sender of the message, Answer :MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer :194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer :The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer :None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer :DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer :0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer : *A. Removed There are two broad classes of packet-switched networks are: Answer : *B. datagram network and virtual-circuit network

Which one is correct about Denial of Service (DoS) attack? Answer : *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer : *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer : *C. Virtual-circuit network Answer : *E. Datagram network Which statement is correct for layering in OSI model Answer : *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer : * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer : *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer : *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer : *C. L/R Which one is correct about P2P network? Answer : *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer : *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer : *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer : *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer : *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer : *E. All of the other SMTP stands for Answer : *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer : *E. TCP . 20 and 21 IMAP and POP are_________ Answer : *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer : *E. MIME TCP provides __________between application processes running on different hosts Answer : *A. Logical communications What is WRONG about UDP? Answer : *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer : *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer : *A. Slow start

If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer : *C. 136 Which one is correct about TCP and UDP? Answer : *A. TCP is reliable transmission and it has congestion control and flow control while UDP is not What flag is used to close TCP connection? Answer : *A. FIN The difference between flow control and congestion control is primarily Answer : *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer : *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer : *A. First What is the data unit used in Internet Protocol (IP)? Answer : *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer : *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer : *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer : *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer : *A. 2 Traceroute command uses Answer : *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer : *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer : *A. network Dijkstra s algorithm is Answer : *A. A link-state routing algorithm Distance vector routing algorithm requires Answer : *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer : *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer : *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer : *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer : *D. Wireless LAN What is store-and-forward operation in switches? Answer : *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer : *A. CSMA/CD Which one is the flag used for framing in PPP Answer : *B. 01111110 Which one can be a MAC address?

Answer : *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer : *A. Address Resolution Protocol Parity checking _____. Answer :*A. can detect a single bit error in a transmission At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is What type of routing algorithm that OSPF use? Answer: Shortest Path Routing Multicast Routing Distance Vector Routing Link State Routing The bytes of data being transferred in each connection are numbered by TCP. The number starts with a none is correct Answer: randomly generated number 1 0 The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI CCITT ANSI ISO ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Streaming live Interactive None is correct Streaming stored The physical layer is concerned with the movement of ___ over the physical mediu m. protocols dialogs Answer: bits programs What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? OSPF IGRP Answer: DHCP HTTP If ASCII character H is sent and the character I is received, what type of error s is this? burst single-bit recoverable Answer: multiple-bit HDLC is a ___ protocol character-oriented

count-oriented byte-oriented Answer: bit-oriented An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? 18.874 sec 1.887 sec 337 sec Answer: 18874 sec What flag is used to close TCP connection? Answer: FIN SYN ACK PSH What type of routing protocol that BGP is? Link State Routing Shortest Path Routing Multicast Routing Answer: Distance Vector Routing A bridge has access to the ___ address of a station on the same network. port physical Answer: none is correct logical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: none is correct physical network transport With WWW as an example of client-server computer software, the client is: all are correct Answer: The machine that you use to display WWW documents The machine that you use to store WWW documents The machine that makes WWW documents available Routers function in the ___ layers. none is correct physical and data link data link and network Answer: physical, data link, and network The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet a and b A ___ document is created by a Web server whenever a browser requests the docume nt dynamic static Answer: Active None is correct

What type of service that VC network provides? Answer: Connection-oriented Connectionless Connection-oriented and Connectionless None is correct A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 13.1% 2.6% 0.8% ___ is more powerful and complex than ___ Answer: IMAP4; POP3 POP3; IMAP4 SMTP; POP3 None is correct TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. message; message none is correct block; block Answer: stream; stream TCP uses ___ to check the safe and sound arrival of data. out of band signaling none is correct the services of another protocol Answer: an acknowledgment mechanism In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are___ rearranged modified added Answer: removed Which IP option is used if exactly four specific router are to be visited by the datagram? record route Answer: strict source route loose source route none is correct What is the service that the UDP protocol provides? Answer: guaranteed delivery error detection none is correct flow control In the OSI model, encryption and decryption are function of the ___ layer. session application Answer: presentation transport Which device can amplify and make free- noise signal to all computer in LAN? router repeater Answer: all three devices switch What is information used to route packet in network? Answer: destination address and source address fields in IP

header source address field in IP header destination addressfield in IP header destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___ speeds up the slower process none is correct slows down the faster process Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. 10BASE-T 10BASE5 10BASE2 Answer: None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is circuit-switched one is Network Layer, one is Transport Layer one is Transport Layer, one is Session Layer Answer: one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a variable-length block none is correct Answer: a fixed number of blocks a fixed-length In ___ resolution, the resolver expects the server to supply the final . none is correct straight Answer: recursive iterative By default, FTP uses which ports? 25 and 110 80 and 81 20 and 21 Answer: 80 and 8080 Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? ITU-T Answer: EIA ANSI ISO In the OSI model, which layer functions as a liaison between user support layers and network support layers? Physical layer Network layer Answer: Transport layer Session layer The Physical layer is connected with the movement of____over the physical medium . Answer: Bits Dialogs Protocols Programs Which of the following statement is correct? Full-Duplex: Communications that can go only one direction Answer: Full-Duplex: Communications in which both sender and receiver can se nd at the same time. Half-Duplex: Communications in which both sender and receiv

er can send at the same time Half-Duplex: Communications that can go only one direction What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards To define some protocols for routing To develop IPv6 standard layers for internetworking connection To define seven standard layers for internetwork connection MAN stands for? Multi-Access Network Major Area Network Answer: Metropolitan Area Network Multi-Access Node In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Added Answer: Removed Rearranged Modified Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Government distributing tax forms electronically File sharing Car manufacturer ordering tires from supplier Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class Desktop computers in offices Server computers in ISP Networks in order, unwired buildings In the OSI model, encryption and decryption are functions of the_____layer. Application Session Transport Presentation Quiz Chapter3 If ASCII character G is sent and the character D is received, what type of error is this? Recoverable Answer: Single-bit Burst At the CRC generate, added the data unit before division process. Answer: 0s are A polynomial is A CRC remainder is 1s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Networking Teminating Authenticating Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Networking Establishing Answer: Authenticating Teminating At the CRC checker,______if the data unit is damaged. A stream of 0s A stream alternating of 0s, 1s A stream of 1s

Answer: A nonzero remainder HDLC is a________protocol Byte-oriented Count-oriented Answer: Bit-oriented Character-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit Multiple-bit Burst Recoverable In cyclic redundancy checking, what is CRC The divisor Answer: The remainder The quotient The dividend In sliding window flow control, if the size is 63, what the range sequence numbe rs? 1 to 64 0 to 64 Answer: 0 to 63 1 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct N(S) N(R) P/F bit 11. G At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is Quiz Chapter4 What device can . Answer: All . Maximun of data flow through in N-port switch (an with L2) Answer: N N-1 N/2 N/4 How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP OSPF

HTTP IGRP What is information used to route packet in network? Destination Address, Source Address, and Protocol fields in IP header Source Address fields in IP header Answer: Destination Address fields in IP header Destination Address and Source Address fields in IP header What type of routing algorithm that OSPF use?---------------------------LinkState Routing Multicast Routing Answer: Shortest Path Routing Distance Vector Routing What does the IP header s protocol field identify? The data link layer protocol that will carry the datagram The application that generated the message carried in the datagram Answer: The transport layer protocol that generated the information in the data field The physical layer specification of the network that will carry the datagram What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: All are correct 127.1.2.3 127.0.0.127 127.0.0.1 IP is________datagram protocol Answer: Both a and b Connectionless Unreliable d.None is correct In classless addressing,_______is assigned to an organization. None is correct A fixed-length A fixed number of blocks Answer: A variable-length block------------------------------------Which layer does ICMP reside in? Network Transport Answer: Physical Data link DHCP is used to: Assign IP ports automatically Assign MAC addresses automatically Assign host names automatically Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP?----------------------------FTP ARP Answer: ICMP DHCP 11. In classless addressing, the ______ is another name for the common part of the address range. A) suffix Answer: prefix C) netid D) none of the above 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct . Answer: suffix

B) C) D) 13

prefix hostid none of the above

In classless addressing, the prefix length defines the _____________.

A) netid B) hostid Answer: mask D) none of the above 14 The number of addresses assigned to an organization in classless address ing _______. A) can be any number B) must be a multiple of 256 Answer: must be a power of 2 D) none of the above 15 The first address assigned to an organization in classless addressing __ _____. A) must be a power of 4 Answer: must be evenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) none of the above 16 Which address could be the beginning address of a block of 32 classless addresses? A) B) Answer: D) 2.4.6.5 2.4.6.16 2.4.6.64 none of the above

17 Which address could be the beginning address of a block of 16 classless addresses? A) B) C) Answer: 2.4.6.5 2.4.6.15 2.4.6.62 none of the above

18 Which address could be the beginning address of a block of 256 classless addresses? A) 2.4.6.5 B) 2.4.6.15 Answer: 2.4.6.0 D) none of the above 19. What type of routing protocol that BGP is? a. b. c. LinkState Routing Shortest Path Routing Multicast Routing

Answer: Distance Vector Routing Quiz Chapter6 What is the data unit used in TCP? Packet

Answer: Segment Frame Datagram What is the service that the UDP protocol provides? Flow control Answer: Guaranteed delivery Error detection None is correct What flag is used to close TCP connection? PSH ACK SYN Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Speeds up the slower process Slows down the faster process Answer: Uses buffers None is correct The difference between TCP and UDP is primarily One is Network Layer, one is Transport Layer Answer: One is connection-oriented, one is connectionless One is Transport Layer, one is Session Layer One is connection-oriented, one is circuit-switched TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream Block; block None is correct Message; message TCP uses______________to check the safe and sound arrival of data. The services of another protocol Out-of-band signaling None is correct Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable Unreliable None is correct Best-effort delivery What is the combination of an IP address and a port number called? A sequence number A checksum A data offset Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a 1 Answer: Randomly generated number None is correct 0 Quiz Chapter7 ______is used to compress video. Either a or b MPEG Answer: JPEG None is correct According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Three

Answer: Two Four None is correct ______is more powerful and complex than______. SMTP; POP3 Answer: IMAP4; POP3 None is correct POP3; IMAP4 What does the URL need to acess a document Pathname Host computer Retrieval method Answer: All are correct The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet A and b A_____document is created by a Web server whenever a browser requests the docume nt. Answer: Static None is correct Dynamic Active With WWW as an example of client-server computer software, the server is: The machine that you use to display WWW documents The machine that enables you to connect to the Internet Answer: The machine that makes WWW document available All are correct _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored None is correct Streaming live Interactive In______resolution, the resolver expects the server to supply the final . Straight None is correct Iterative Answer: Recursive By default, FTP uses which ports? Answer: 20 and 21 25 and 110 80 and 8080 80 and 81 11 . Currently two message access protocols are available:_____ and_____. a.POP3; IMAP2 b.POP4; MAP1 Answer:.POP3; IMAP4 d.none of the above 12 With WWW as an example of client-server computer software, the client is : a. all are correct

Answer: The machine that you use to display WWW documents c. d. The machine that you use to store WWW documents The machine that makes WWW documents available

Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? ITU-T Answer: EIA ANSI ISO In the OSI model, which layer functions as a liaison between user support layers and network support layers? Physical layer Network layer Answer: Transport layer Session layer The Physical layer is connected with the movement of____over the physical medium . Answer: Bits Dialogs Protocols Programs Which of the following statement is correct? Full-Duplex: Communications that can go only one direction Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time Half-Duplex: Communications in which both sender and receiver can send at the sa me time Half-Duplex: Communications that can go only one direction What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards To define some protocols for routing To develop IPv6 standard layers for internetworking connection To define seven standard layers for internetwork connection MAN stands for? Multi-Access Network Major Area Network Metropolitan Area Network Multi-Access Node In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Added Answer: Removed Rearranged Modified Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Government distributing tax forms electronically File sharing Car manufacturer ordering tires from supplier Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class Desktop computers in offices Server computers in ISP Networks in order, unwired buildings In the OSI model, encryption and decryption are functions of the_____layer. Application Session Transport Answer: Presentation Quiz Chapter3

If ASCII character G is sent and the character D is received, what type of error is this? Recoverable Single-bit Multiple-bit Answer: Burst At the CRC generate, added the data unit before division process. Answer: 0s are A polynomial is A CRC remainder is 1s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Networking Teminating Authenticating Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Networking Establishing Answer: Authenticating Teminating At the CRC checker,______if the data unit is damaged. A stream of 0s A stream alternating of 0s, 1s A stream of 1s Answer: A nonzero remainder HDLC is a________protocol Byte-oriented Count-oriented Answer: Bit-oriented Character-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit Multiple-bit Burst Recoverable In cyclic redundancy checking, what is CRC The divisor Answer: The remainder The quotient The dividend In sliding window flow control, if the size is 63, what the range sequence numbe rs? 1 to 64 0 to 64 Answer: 0 to 63 1 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct N(S) N(R) P/F bit 11. G At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is

Quiz Chapter4 What device can . Answer: All . Maximun of data flow through in N-port switch (an with L2) Answer: N N-1 N/2 N/4 How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP OSPF HTTP IGRP What is information used to route packet in network? Destination Address, Source Address, and Protocol fields in IP header Source Address fields in IP header Answer: Destination Address fields in IP header Destination Address and Source Address fields in IP header What type of routing algorithm that OSPF use?---------------------------LinkState Routing Multicast Routing Answer: Shortest Path Routing Distance Vector Routing What does the IP header s protocol field identify? The data link layer protocol that will carry the datagram The application that generated the message carried in the datagram Answer: The transport layer protocol that generated the information in the data field The physical layer specification of the network that will carry the datagram What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: All are correct 127.1.2.3 127.0.0.127 127.0.0.1 IP is________datagram protocol Answer: Both a and b Connectionless Unreliable d.None is correct In classless addressing,_______is assigned to an organization. None is correct A fixed-length A fixed number of blocks

Answer: A variable-length block------------------------------------Which layer does ICMP reside in? Network Transport Answer: Physical Data link DHCP is used to: Assign IP ports automatically Assign MAC addresses automatically Assign host names automatically Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP?----------------------------FTP ARP Answer: ICMP DHCP 11. In classless addressing, the ______ is another name for the common part of the address range. A) suffix Answer: prefix C) netid D) none of the above 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct . Answer: suffix B) prefix C) hostid D) none of the above 13 In classless addressing, the prefix length defines the _____________.

A) netid B) hostid Answer: mask D) none of the above 14 The number of addresses assigned to an organization in classless address ing _______. A) can be any number B) must be a multiple of 256 Answer: must be a power of 2 D) none of the above 15 The first address assigned to an organization in classless addressing __ _____. A) must be a power of 4 Answer: must be evenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) none of the above 16 Which address could be the beginning address of a block of 32 classless addresses? A) B) Answer: D) 17 2.4.6.5 2.4.6.16 2.4.6.64 none of the above

Which address could be the beginning address of a block of 16 classless

addresses? A) B) C) Answer: 2.4.6.5 2.4.6.15 2.4.6.62 none of the above

18 Which address could be the beginning address of a block of 256 classless addresses? A) 2.4.6.5 B) 2.4.6.15 Answer: 2.4.6.0 D) none of the above 19. What type of routing protocol that BGP is? a. b. c. LinkState Routing Shortest Path Routing Multicast Routing

Answer: Distance Vector Routing Quiz Chapter6 What is the data unit used in TCP? Packet Answer: Segment Frame Datagram What is the service that the UDP protocol provides? Flow control Answer: Guaranteed delivery Error detection None is correct What flag is used to close TCP connection? PSH ACK SYN Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Speeds up the slower process Slows down the faster process Answer: Uses buffers None is correct The difference between TCP and UDP is primarily One is Network Layer, one is Transport Layer Answer: One is connection-oriented, one is connectionless One is Transport Layer, one is Session Layer One is connection-oriented, one is circuit-switched TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream Block; block None is correct Message; message TCP uses______________to check the safe and sound arrival of data. The services of another protocol Out-of-band signaling

None is correct Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable Unreliable None is correct Best-effort delivery What is the combination of an IP address and a port number called? A sequence number A checksum A data offset Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a 1 Answer: Randomly generated number None is correct 0 Quiz Chapter7 ______is used to compress video. Either a or b MPEG Answer: JPEG None is correct According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Three Answer: Two Four None is correct ______is more powerful and complex than______. SMTP; POP3 Answer: IMAP4; POP3 None is correct POP3; IMAP4 What does the URL need to acess a document Pathname Host computer Retrieval method Answer: All are correct The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet A and b A_____document is created by a Web server whenever a browser requests the docume nt. Answer: Static None is correct Dynamic Active With WWW as an example of client-server computer software, the server is: The machine that you use to display WWW documents The machine that enables you to connect to the Internet Answer: The machine that makes WWW document available All are correct _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored None is correct Streaming live

Interactive In______resolution, the resolver expects the server to supply the final . Straight None is correct Iterative Answer: Recursive By default, FTP uses which ports? Answer: 20 and 21 25 and 110 80 and 8080 80 and 81 11 . Currently two message access protocols are available:_____ and_____. a.POP3; IMAP2 b.POP4; MAP1 Answer: POP3; IMAP4 d.none of the above 12 With WWW as an example of client-server computer software, the client is : a. all are correct

Answer: The machine that you use to display WWW documents c. d. The machine that you use to store WWW documents The machine that makes WWW documents available

At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is What type of routing algorithm that OSPF use? Answer: Shortest Path Routing Multicast Routing Distance Vector Routing Link State Routing The bytes of data being transferred in each connection are numbered by TCP. The number starts with a none is correct Answer: randomly generated number 1 0 The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI CCITT ANSI ISO ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Streaming live Interactive None is correct Streaming stored

The physical layer is concerned with the movement of ___ over the physical mediu m. protocols dialogs Answer: bits programs What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? OSPF IGRP Answer: DHCP HTTP If ASCII character H is sent and the character I is received, what type of error s is this? burst single-bit recoverable Answer: multiple-bit HDLC is a ___ protocol character-oriented count-oriented byte-oriented Answer: bit-oriented An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? 18.874 sec 1.887 sec 337 sec Answer: 18874 sec What flag is used to close TCP connection? Answer: FIN SYN ACK PSH What type of routing protocol that BGP is? Link State Routing Shortest Path Routing Multicast Routing Answer: Distance Vector Routing A bridge has access to the ___ address of a station on the same network. port physical Answer: none is correct logical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: none is correct physical network transport With WWW as an example of client-server computer software, the client is:

all are correct Answer: The machine that you use to display WWW documents The machine that you use to store WWW documents The machine that makes WWW documents available Routers function in the ___ layers. none is correct physical and data link data link and network Answer: physical, data link, and network The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet a and b A ___ document is created by a Web server whenever a browser requests the docume nt dynamic static Answer: Active None is correct What type of service that VC network provides? Answer: Connection-oriented Connectionless Connection-oriented and Connectionless None is correct A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 13.1% 2.6% 0.8% ___ is more powerful and complex than ___ Answer: IMAP4; POP3 POP3; IMAP4 SMTP; POP3 None is correct TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. message; message none is correct block; block Answer: stream; stream TCP uses ___ to check the safe and sound arrival of data. out of band signaling none is correct the services of another protocol Answer: an acknowledgment mechanism In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are___ rearranged modified added Answer: removed

Which IP option is used if exactly four specific router are to be visited by the datagram? record route Answer: strict source route loose source route none is correct What is the service that the UDP protocol provides? Answer: guaranteed delivery error detection none is correct flow control In the OSI model, encryption and decryption are function of the ___ layer. session application Answer: presentation transport Which device can amplify and make free- noise signal to all computer in LAN? router repeater Answer: all three devices switch What is information used to route packet in network? Answer: destination address and source address fields in IP header source address field in IP header destination addressfield in IP header destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___ speeds up the slower process none is correct slows down the faster process Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. 10BASE-T 10BASE5 10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is circuit-switched one is Network Layer, one is Transport Layer one is Transport Layer, one is Session Layer Answer: one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a variable-length block none is correct Answer: a fixed number of blocks a fixed-length In ___ resolution, the resolver expects the server to supply the final . none is correct straight Answer: recursive iterative By default, FTP uses which ports? 25 and 110 80 and 81 20 and 21 Answer: 80 and 8080

CCNA 1 Chapter 1: Computing Basics Question 1: b What is NIC? A WAN adapter Answer: A printed circuit board that provides network communication A card uses only for Etherner networks A standardized datalink layer address Question 2: c What must computers on a network have in common in order to directly communicate with each other? Use the same operating system Use the same hardware Answer: Use the same protocol Built by the same company Question 3: a What is LAN? Answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. A network that connects workstations, terminals, and other devices a large metro politan area. A network that serves users across a geographically large area and often uses tr ansmission devices provided by a common carrier. A network that covers a larger area than a MAN Question 4: b What do WAN do? Allows printer and file sharing Answer: Operate over a large geographic area Operates over a metropolitan area to host connectivity within a limmited area Provide host Question 5: c What type of numbering system is characterized by ones and zeros? Base 4 Base 10 Answer: Binary Hexadecimal Question 6: c Which numbering system is based on powers of 2? Octal Hexadecimal Answer: Binary ASCII Question 7: b What is the decimal number 151 in binary? 10100111 Answer: 10010111 10101011 10010011 Question 8: d What is the binary number 11011010 in decimal? 186 202

222 Answer: 218 Question 9: b Bandwidth is described in _________? Bytes per second Answer: Bits per second Megabits per milisecond Centimeters Question 10: c What term is usec to describe the rated throughput capacity of a given n etwork medium or protocol? TCP/IP Ethernet Answer: Bandwidth Routing protocol Chapter 2: Q1: a Which layer offers provisions for data expedition, class of service, and exception reporting? Answer: Session Presentation Network Datalink Q2: b Which of the following is the PDU for the transport layer? Frame Answer: Segment Packet Bits Q3: c Which layer of the OSI model provides connectivity and path selection be tween two end systems where routing occurs? Physical Layer Data Link Layer Answer: Network Layer Transport Layer Q4: d Which layer of the OSI model is responsible for reliable network communi cation between end nodes and provides mechanisms for the establishment, maintena nce, and termination of virtual circuits, transport fault detection and recovery , and information flow control? Physical Layer Data Link Layer Network Layer Answer: Transport Layer Q5: b Which of the following best describes the function of the presentation l ayer? Responsible for the reliable network communication between end nodes. Answer: Concerned with data structures and negotiation data transfer syntax Provides connectivity and path selection between two end systems Manages data exchange between layer entities

Q6: a What functions are the data link layer concerned with? Answer: Physical addressing, network topology, and media access. Manages data exchange between presentation layer entities Synchronizes cooperating applications, and establishes agreement on procedures f or error recovery and contronl of data integrity Provides mechanisms for the establishment, maintenance, and termination of virtu al circuits, transport fault detection, recovery, and information flow control. Q7: d Which of the following protocols uses UDP as its underlying protocol? SMTP FTP HTTP Answer: TFTP Q8: b Which of the following statements regarding TCP/IP is true? TCP/IP combines the OSI data link and session layer issues into its application layer Answer: TCP/IP combines the OSI data link and physical layers into one layer TCP/IP combines the OSI network and application layers into one network layer TCP/IP combines the bottom four layers of the OSI model into one Internet layer Q9: a Packets are encapsulation in frames at which layer of the OSI model? Answer: Data link Network Transport Session Q10: b In the TCP/IP model which layer would deal with reliability, flow contro l, and error correction? Application Answer: Transport Internet Network Access Chapter 3: Q1: b A NIC is considered an OSI layer _____ device a. One Answer: Two c. Three d. Four Q2: a A hub is an OSI layer ____ device Answer: One b. Two c. Four d. Six Q3: c Which of the following is true concerning a bridge and its forwarding de cisions? They operate at OSI layer 2 and use IP addresses to make decisions. They operate at OSI layer 3 and use IP addresses to make decisions. Answer: They operate at OSI layer 2 and use MAC addresses to make decisions.

They operate at OSI layer 3 and use MAC addresses to make decisions. Q4: b Which of the following is true concerning the function of a switch? Increases the sizes of collision domains Answer: Combines the connectivity of a hub with the traffic regulation of a brid ge Combines the connectivity of a hub with the traffic directing of a router Performs Layer 4 path selection Q5: c What do routers connect? Bridges and repeaters Bridges and hubs Answer: Two or more networks Hubs and nodes Q6: c Layer 1 Layer 2 Answer: Layer 4 Q7: a What is the correct order of encapsulation? Answer: Data, segment, Packet, Frame, Bits Data, Frame, Packet, Segment, Bits Data, Packet, Frame, Segment, Bits Data, Bits, Packet, Frame, Segments Q8: c Which LAN topology connects all workstations to a central point, usually a hub or a switch? Bus Ring Answer: Star Hierarchical Q9: d When connecting four host computers in a LAN what is the minimum hardwar e needed to be used for file sharing capability? Cloud Switch Router Answer: Hub Q 10: c If 4 hosts are connected to a hub and then to the Internet, how many IP addresses are required for these 5 devices? One Two Answer: Four Five Chapter 4: Q1: b What kind of power is supplied to the microchips on the motherboard of a computer? AC What does a router route? bits frames Layer 3 packets segments

Answer: DC RC MC Q2: a Where is the safely ground connected for a computer? Answer: Exposed metal parts The monitor The mouse The network connection Q3: d Electrons flow in ___ loops called ____ Open, voltage Closed, voltage Open, circuits Answer: Closed, circuits Q4: a A half duplex circuit means Answer: Only one side can talk at a time b. The signal strength is cut in half c. The signal strength is doubled d. Two hosts can set half their data Q5: c Attenuation means Travel Delay Answer: A signal losing strength to its surroundings All of the above Q6: a Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? Answer: EMI caused by electrical motors RFI caused by electrical motors Impedance caused by radio systems EMI caused by lighting Q7: d What is the primary cause of crosstalk? Cable wires that are too large in diameter Too much noise in a cable s data signal Electrical motors and lighting Answer: Electrical signals from other wires in a cable Q8: b Which of the following describes cancellation? Wires in the same circuit cancel each other s electrical current flow Answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference The magnetic fields from one cable run cancel magnetic fields of another cable r un External magnetic fields cancel the fields inside network cabling Q9: c What is it called when two bits from two different communicating compute rs are on a shared medium at the same time? Latency

Dispersion Answer: Collision Obstruction Q10: a ____ means converting binary data into a form that can travel on a physi cal communications link Answer: Encoding Decoding Encrypting Decrypting Chapter 5: Q11: a The network area within which data packets originate and collide is call ed a _____? Answer: Collision domain Network domain Collision segment Network segment shield Q2: b What happens to packets that are involved in a collision? The packets return to the originator Answer: The Packets are destroyed bit by bit The Packets continue on to the target device with corrupt data Another Q3: c What is another name for a rollover cable? A patch cable A cross-connect cable Answer: A console cable An inverted cable Q4: c Using repeaters ____ the collision domain Reduces Has no effect on Answer: Extends Another Q5: c Make it Make it Answer: Allow 6 Q6: b Which best describes a collision in a Ethernet network? The effects of having too many repeaters in a network Answer: The result of two nodes transmitting at the same time The effect when two nodes have the same MAC address. The result of having non OSI compliant protocols on the network Q7: a How many collision domains exist in a network containing two hubs? Answer: One Two What does the twisting of the wires do in a CAT-5 cable? thinner less expensive Reduce noise problems pairs to fit in the space of 4 pairs

Three Five Q8: c Seperating collision domains with bridges, switches and routers is calle d ____ Switching domains Extending domains Answer: Segmentation Fragmentation Q 9: b Which best describes bus topology? All of its nodes connected directly to a central point (like a hub) Answer: All of its nodes connected directly to one physical link All nodes connected to each other (fully meshed) All nodes connected to exactly 2 other nodes Q 10: a Which of the following best describes an extended star topology? Answer: LAN topology where a central hub is connected by a vertical cabling to o ther hubs LAN topology in which transmissions from network stations propagate the length o f a single coaxial cable and are received by all other stations LAN topology in which end points on a network are connected to a common central switch by point-to-point links LAN topology where central points on a network are connected to a common central switch by linear links Chapter 6: Q1: a Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? Answer: IEEE 802.3 IEEE 802.5. EIA?TIA 568B EIA/TIA 569 Q2: a Which is not one of the recognized IEEE sublayers? Answer: Data link Control Media access control Logical link control Another Q 3: a Why did the IEEE create LLC? Answer: To meet the need to have part of the datalink layer function be independ ent of existing technologies To replace an older IBM protocol To create a protocol that would not be control by the US government To allow for data encryption before transmission Q4: b Convert the decimal number 2989 to Hex FDD1 Answer: BAD TED CAD

Q5: a Convert the hex number ABE into decimal Answer: 2750 5027 2570 7250 Q6: b Convert the binary number 11100010 to hex D2 Answer: E2 G2 H20 Q7: a Which of the following statements best describes communication between t wo devices on a LAN? Answer: The source device encapsulates data in a frame with the MAC address of th e destination device, transmits, everyone on the LAN sees it, but the devices wi th non-matching addresses otherwise ignore the frame The source encapsulates the data and places a destination MAC address in the fram e. It puts the frame on the LAN, where only the device with matching address can check the address field The source device encapsulates data in a frame with the MAC address of the Desti nation device, puts in on the LAN, and the device with the matching address remo ves the frame Each device on the LAN receives the frame and passes it up to the computer, where software will decide whether to keep or discard the frame Q8: b Layer 1 Answer: Layer 3 Layer 4 Q9: c How does a computer on a LAN detect an error in a frame? Send a copy of the frame back to the sender for verification Check the destination address to verify that the frame was really intended for t hem Answer: Compare a FCS in the frame to one that the computer calculates from the contents of the frame Calculate a checksum from the data in the frame, and send it back to the source for verification Q 10: c Which is true of a deterministic MAC protocol? It defines collisions and specifies what to do about them It allows the hub to determine the number of users active at any one time Answer: It allows hosts to take their turn for sending data It allows the use of a talking stick by network administrators to control the medi a access of any users considered troublemakers Chapter 7: Q1: a Which of the following describe Token-Ring? Answer: Data transfer rates of 4 Mbps or 16 Mbps Typically found with a linear bus topology Can only be implemented with fiber A frame is a ______ PDU Layer 2 PDU PDU PDU

Uses collision detection for access method Q 2: c The data/command frame and token frame have which of the following field s in common? Start delimiter, frame check sequence (FCS), and access control Start delimiter, token control, and end delimiter Answer: Start delimiter, access control, and end delimiter Another Q3: d What is the difference between single-mode and multi-mode FDDI? Single-mode allows one mode of light to propagate through the fiber (1) Single-mode is capable of higher bandwidth than multi-mode (2) Single-mode can run longer distance than multi-mode (3) Answer: All (1), (2), (3) Q4: d It uses It is a It is a Answer: Q5: a If you hava to connect a FDDI between buildings, which mode of fiber woul d you use? Answer: Single-mode Multi-mode Intra-mode Inter-mode Q6: a Which of the following is an accurate description of an Ethernet variety ? Answer: 10BASE T uses and transmits at 10 Mbps 10BASE - TX uses CAT5 and transmits at 100 Mbps 10BASE T uses CAT2 and transmits at 10 Mbps 100BASE FX is multi-mode fiber that transits at 10Mbps Q7: c The Ethernet version 2 header is ____ the header of an 802.3 frame Much longer than Much shorter than Answer: The same length as Completely different than Q8: c Which of the following is true regarding 10BASET signals? They use no type encoding They do not use any type of clocking signal when transmitting Answer: Designed to send and receive signals over a segment that consists of 4 w ires Designed to send and receive signals over a segment that consists of 6 wires Q9: b A _____ diminishes the traffic experienced by devices on all connected segments, because only a certain percentage of traffic is forwarded Hub Answer: Bridge One of the primary reasons FDDI is extremely reliable is because ____? CAT 3 cabling CSMA/CD network CSMA/CA network Of it s dual ring design

Repeater NIC Q10: b Which of the following best describes a broadcast storm? A frame that will be sent to all nodes on a network Answer: When too many broadcasts are sent out over the network A section of a network that is bounded by bridges, routers, or switches The network areas within which frames that have collided are propagated Chapter 8: Q1: c If Acme Inc. occupies the first three floors of a building and each floo r is 1500 square meters, how many wiring closets should be installed according t o EIA/TIA 569? One Three Answer: Six Nine Q2: c Which of the following is a specification for walls, floors, and ceiling s of a wiring closet? A maximum of 3.65m feet of wall space should be provided for terminations and re lated equipment for the POP Rooms selected for wiring closets should have a dropped or false ceiling for eas y access Answer: Interior walls on which equipment is to be mounted should be covered wit h 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 c m Fire retardant paint should never be used to cover interior walls due to health and safety restrictions Q3: b Which of the following is a requirement for room and equipment access in a wiring closet? The door should be at least 1.2 m wide and should swing open into the room ro en sure easy access to the room for workers and equipment Answer: The wiring closet should lock from an outside access in such a way that exiting from the room is always possible. Wiring hubs and patch panels must be wall-mountd using hinged wall brackets that are attached directly to the underlying wall surface When a distribution rack is usesd to mount patch panels and wiring hubs, the min imum distance for the rack from the wall should be 15 cm Q4: Question 1: What is the purpose of the safety ground in a computer? A. connects the hot wire to the chassis B. prevents metal parts from discharging hazardous voltage through the chassis C. connects the neutral wire to the chassis Answer: prevents metal parts from becoming energized with a hazardous voltage Question 2: What best describes a wiring closet specification?

A. under a

No horizontal cabling coming from work areas should be run

raised floor. B. All cable leaving the room to intermediate distribution facilities and computer and communications rooms located on other floors of a building should be via 8 cm (or smaller) conduits or sleeved cores. ?C. Any wall or ceiling openings provided for conduits or sleeved cores must be sealed with smoke and flame retardant materials. Answer: The room should be equipped with a single stage sprinkler system. Question 3: When starting to design a network, what should be the first step in the process? Answer: collecting information about the organization B. gathering information about the network devices and media that will be used C. documenting costs and developing a budget for implementation D. identifying the resources and constraints of the organization Question 4: What happens if you touch two objects with different potential voltages? A. nothing Answer: you complete the circuit and get a shock C. the computer receives a power surge D. the computer may lose data Question 5: What kind of floor should the wiring room have? Answer: tile or other finished surface B. carpet C. unfinished stone D. electronics grade carpet Question 6: How can the creation of potentially dangerous circuits between buildings be avoided? A. A voltage regulator, that will shut off the network if the voltage gets too high, should be installed at both buildings. Answer: Fiber-optic cable should be used as the backbone of the network. C. Shielded twisted pair (STP) cable should be used as the backbone of the network. D. New ground wires should be installed so that the energy potentials between the buildings will be the same. Question 7:

What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? A. Nothing, because IEEE standards separate LAN networking media from power connections. B. The networking media could allow the network to run at higher speeds. C. The networking media would ground the signal preventing it from operating normally. Answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. Question 8: Why should fluorescent light fixtures be avoided in wiring closets? A. They provide false color lighting which can lead to mistakes in making connections. Answer:. They generate outside interference. C. They can degrade some plastic materials used in network equipment. D. There often is insufficient room in a wiring closet to change out the fluorescent bulbs easily and safely. Question 9: In what types of situations will a safety ground connection not be sufficient? Answer:. building B. when identical C. when that defeats the earth D. when different potential when the earth ground is attached to multiple floors of a the earth grounds between two parts of a network are the power plant sends an irregular surge of power ground ground wires in separate locations have slightly

Question 10: How can UTP backbone cabling facilitate entry of lightning into a building? A. The insulation in the wire acts as a lightning rod and attracts the strike. Answer:. The copper provides a pathway for lightning to enter a building. C. It won't facilitate lightning strikes if the wire is fused at both ends. D. It does not facilitate lightning strikes unless the copper has been damaged. Question 11:

What best describes the problems caused by electrostatic discharge (ESD)? A. It erases power supplies, hard drives, and RAM. Answer:. It destroys semiconductors and data. C. It shoots alternating current through a computer. D. It overwrites the BIOS chip. Question 12: If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA/TIA 569? A. one B. three Answer:. six D. nine Question 13: What is the first step in locating a wiring closet for a network? A. Identify the number of computers that will be part of the network. B. Identify the number of printers and file servers that will be part of the network. Answer:. Identify on a floor plan, all devices that will be connected to the network. D. Identify the topological requirements of devices that will be in the network. Question 14: What kind of power disturbances can be caused by strikes? A. oscillations B. sags Answer:. surges D. brownouts Question 15: What network device is used in an extended star topology when the catchment area of one wiring closet is not enough? Answer:. repeater B. backoff C. terminator D. suppressor Question 16: What is a common cause of oscillation often called harmonics? Answer:. excessively long electrical wiring runs B. nearby lightning strikes C. a power line that falls below 80% of the normal voltage D. power company switching operations Question 17: Why are common mode problems a hazard to you or your computer? Answer:. They go directly to the computer chassis. B. They go directly to the computer's CPU. C. They short wires to the power supply. D. They fuse computer components.

Question 18: Where should the main distribution facility (MDF) be located in a multi-story building using an extended star topology? A. next to the POP B. on the first floor Answer:. on one of the middle floors D. in the basement Question 19: What best describes the difference between alternating and direct current? A.DC helps computers to work more efficiently, whereas AC can cause noise. B. AC flows at a constant value, whereas DC rises and falls. C.DC shifts ions from pole to pole, whereas AC ions run in one direction. Answer:. DC flows at a constant value, whereas AC rises and falls. Question 20: How does AC line noise create problems? A. by overflowing the logic gates Answer:. by adding unwanted voltage to the desired signals C. by hindering the CPU in detecting signal waves D. by intensifying the leading and trailing edges on signals Question 21: What is the "one-hand rule?" Answer:. Only touch electrical devices with one hand at a time to prevent electricity from flowing through the body. B. When setting up the network only use one bare hand--always wear a glove on at least one hand. C. When using tools that are not insulated only use one hand, hold onto a ground with the other hand. D. There is no such rule. Question 22: Which type of networking media is now installed most often for backbone cabling? A. 100 ohm unshielded twisted pair cable B. 150 ohm shielded twisted pair cable Answer:. 62.5/125 micron fiber-optic cable D. 50 ohm coaxial cable Chapter 9 Question 1: Which of the following is a source that can produce interference on UTP cable? Answer:. fluorescent lights B. fiber-optic cabling C. bridges D. coaxial cabling

Question 2: Why are split pairs a problem for network installations? A. The wires are unshielded and easily lose synchronicity. Answer:. The wires are part of different circuits so signals are not protected and cross-talk occurs. C. The wires are part of different circuits and easily shorted out by power spikes. D. It is difficult to detect split pairs which requires performing a wire map. Question 3: When should cable not be routed in an existing raceway? A. if the raceway distance exceeds 100 feet B. if the raceway material is partially metallic Answer:. if it already contains a power cable D. if it contains a telephone line Question 4: What is the central junction for the network cable? A. POP B. server C. center point Answer:. wiring closet Question 5: What should be used to mount cable to a wall? Answer:. tie wraps B. electrical tape C. staples D. paperclips Question 6: If you have one wiring closet and you want to add more, what name is given to additional wiring closets? Answer:. IDFs B. MDFs C. Extended Stars D. POPs Question 7: All the items below are personal safety precautions before you install cable except : A. Wear long sleeves. B. Wear long pants. Answer:. Wear baggy clothes. D. Check for power cables. Question 8: What tool would you use to attach CAT5 cable to a patch panel? A. 110 patch tool B. cable terminator Answer:. punch tool D. patch terminator Question 9: What is one advantage of using distribution racks for mounting patch panels? Answer:. allows easy access to both the front and back of the equipmen t

B. C. D.

provides neutral ground inexpensive compared to brackets requires minimal wall space

Question 10: Why is the wiring sequence critical when RJ-45 jacks are used at the telecommunications outlet in a horizontal cabling scheme? Answer:. For the network to function properly. B. Improper wiring sequence will short out the connection. C. You could get a nasty electrical shock. D. The collision rate is adversely affected. Question 11: What is the most important thing to do before you work in walls, ceilings or attics? A. Label the faceplate. B. Measure out the cable. Answer:. Turn off power to the area. D. Install the patch panel. Question 12: What kind of jack must be used for making a connection to a Category 5 unshielded twisted pair cable in a horizontal cabling scheme? Answer:. RJ-45 B. BNC C. UTP 55 D. EIA 45 Question 13: Why shouldn't you install a jack in the bottom five centimeters of a wooden baseboard? Answer:. The bottom plate of the wall will prevent you from pushing th e box into the baseboard. B. Most floors have metal supports that produce electromagnetic interference when close to the jack. C. Dust and dirt accumulate under it that can then get into the connection and affect network performance. D. It's so close to the floor, there isn't enough space for most people to work and manipulate the wires. Question 14: Which of the following describes a cable tester measurement of signal attenuation? Answer:. It measures the reduction in power of a signal received from a signal injector. B. It measures the increase in power of a signal received from a signal injector. C. The signal injector attaches to the near end of the cable. D. The frequency to be used for testing is specified in EIA/TIA 568A. Question 15: How is an RJ-45 jack surface mounted? A. with a punch tool B. with Velcro C. flush with the surface Answer:. adhesive backed or screw box Question 16:

What is the first thing you should do if near-end crosstalk is detected? A. Redo all connections at the patch panel. B. Isolate which connection is the cause by running a TDR test. C. Redo all connections at the cross connects. Answer:. Visually check the horizontal cabling. Question 17: Which best describes a patch panel's function? A. It serves as a temporary fix to network problems. B. It acts as a router for temporary networks connecting the various devices often found at conventions and shows. Answer:. It acts as a switchboard where horizontal cabling from workst ations can be connected to other devices to form a LAN. D. It allows the network administrator to test the entire network cabling from a single location. Question 18: How many pins are on each of the ports of a patch panel? A. 4 pins Answer:. 8 pins C. 11 pins D. 45 pins Question 19: What should be done when preparing to run cable? A. Cut the cable before pulling it. B. Unroll it before pulling it through the ceiling. Answer:. Label the boxes and cable. D. Take the cable out of the boxes. Question 20: What kind of a cable must you use when laying cable through spaces where air is circulated? A. shielded B. double coated Answer:. fire rated D. unshielded Question 21: How does a cable tester (a TDR) measure distance? A. The cable tester identifies signal degradation, indicating the cable is longer than the acceptable maximum length. B. It determines the time a signal takes to be reflected back from closed-ended cable. Answer:. It times the signal sent towards and reflected back from the end of an open-ended cable. D. It measures the ability of other devices on the network to receive and send signals through the cable. Question 22: What type of raceway should be used if it will be visible in the room? A. channel guide Answer:. decorative C. ladder rack D. gutter Question 23: Why is establishing a baseline performance level for a network important?

A. for fulfilling one of the requirements necessary for you to get your network certification B. for providing your client with proof of a successful installation Answer:. for future periodic testing of the network and diagnostics D. for obtaining a network registration and identification number from TIA/EIA and IEEE Question 24: What is a rough diagram that shows where the cable runs are located called? Answer:. cut sheet B. sketch C. cable plan D. cabling route Question 25: When running cable from the wiring closet to wall jacks, where is the cable itself labeled? A. at each tie Answer:. at each end C. at the jack end D. at the panel end Chapter 10 Question 1: What characteristic must hosts on a network possess in order to communicate directly ? A. same vendor code Answer:. same network ID C. same MAC address D. separate subnets Question 2: Which of the following describes the effect of subnetting on the amount of broadcast traffic? Answer:. decreases it, because broadcasts are not forwarded outside a subnet B. decreases it, because it will take less time for a host to get broadcasts from the routers. C. increases it, because the packets must be forwarded to all subnets D. increases it, because router's duplicate broadcasts Question 3: Which of the following correctly describes an ISP? A. Internal Service Protection B. Internal Service Provider Answer:. Internet Service Provider D. Internet Service Protection Question 4: Which of the following is an example of a Class C broadcast address? A. 190.12.253.255 B. 190.44.255.255 Answer:. 221.218.253.255 D. 129.219.145.255

Question 5: What is decimal number 164 in binary? Answer:. 10100100 B. 10010010 C. 11000100 D. 10101010 Question 6: Which of the following is the approximate number of hosts supported in a Class B unsubnetted network? A. 254 B. 2024 Answer:. 65 thousand D. 16 million Question 7: Which of the following describes the relationship between path determination and the routing of packets? A. performed only by switches B. performed only by different devices C. they are different processes Answer:. they are the same process Question 8: Which OSI layer adds an IP header? A. Layer 1 B. Layer 2 Answer:. Layer 3 D. Layer 4 Question 9: Which type of addressing scheme is formed by MAC addresses? Answer:. flat B. circular C. hierarchical D. elliptical Question 10: Which address(es) appear in an IP packet's header? A. source address B. destination address Answer:. source and destination addresses D. there are no addresses in the IP packet header. Question 11: Which of the following is a benefit of network segmentation? Answer:. reduced congestion B. reduced equipment requirements C. creation of more IP addresses D. creation of more MAC addresses Question 12: Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer:. 205.255.170.205 B. 109.255.170.109 C. 205.127.200.205 D. 109.127.200.109

Question 13: Which octet(s) are assigned locally in a class B address? A. The first octet is assigned locally. B. The second octet is assigned locally. C. The first and second octets are assigned locally. Answer:. The third and fourth octets are assigned locally. Question 14: What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? A. 2 B. 4 Answer:. 6 D. 8 Question 15: What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? A. partitions B. autonomous systems Answer:. subnets D. divisions Question 16: Which class of network addresses allows the borrowing of 15 bits to create subnets? Answer:. Class A B. Class B C. Class C D. No class of network allows the borrowing of 15 bits. Question 17: Which part of a network layer address does the router use during path determination? A. the host address B. the router address C. the server address Answer:. the network address Question 18: Which of the following represents the use of binary ones in a subnet mask? A. host bits B. subnet bits C. network bits Answer:. subnet and network bits Question 19: How large is the network/subnet portion of a Class B license having a subnet mask of 255.255.240.0? A. 18 bits B. 19 bits Answer:. 20 bits D. That is an invalid mask for a Class B network. Question 20: How many bits are in an IP address? A. 4 B. 8 C. 16

Answer:.

32

Question 21: How many total subnets can be created if four bits are borrowed from the host field? A. 8 Answer:. 16 C. 32 D. 64 Question 22: What is specified by the network number in an IP address? Answer:. the network to which the host belongs B. the physical identity of the computer on the network C. the node of the subnetwork which is being addressed D. the broadcast identity of subnetwork Question 23: Which of the following assists devices on the same network in determining a packet's final destination? A. source IP address B. vendor number C. host protocol Answer:. host ID Question 24: Which of the following would be the largest possible number expressed by an 8 bit binary number? A. 0 Answer:. 11111111 C. 10101011 D. 10101010 Question 25: Which of the following best describes the address 139.219.255.255 in an unsubnetted environment? A. Class A broadcast address B. Class B host address Answer:. Class B broadcast address Class C host address Chapter 11 Question 1: The IP address for a router interface should be part of what? Answer:. the network attached to the interface B. any network attached to the router C. it does not matter D. router interfaces never have IP addresses Question 2: When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? A. IP address of the router B. MAC address of the router C. MAC address of the destination device Answer:. IP address of the destination host Question 3:

What is the correct term for when routes are learned automatically? A. static routing B. automatic routing C. enhanced routing Answer:. dynamic routing Question 4: What do bridges and switches use to make data forwarding decisions? A. logical addresses Answer:. physical addresses C. network addresses D. IP addresses Question 5: Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer:. router B. hub C. bridge D. switch Question 6: Which type of routing protocol is RIP? Answer:. distance vector B. link state C. hybrid D. spanning tree Question 7: Router ARP tables hold information from which of the following? A. all Ethernet LANs Answer:. all networks connected to them C. all networks in the Internet D. MAC addresses only Question 8: What is the most common protocol used to transfer routing information between routers located on the same network? A. OSPF Answer:. RIP C. IGRP D. EIGRP Question 9: In a connection-oriented system, what happens before any user data is transferred? A. a connection is established with the recipient's local router Answer:. a connection is established between the sender and receiver C. a connection is established with the sender's local router D. the destination is not contacted before any actual data is sent Question 10: What happens if a data packet reaches a router that is destined for a network with which that router is not directly connected? A. The router forwards the packet to all other routers. B. The router returns the packet to the source device with no explanation. Answer:. The router forwards the packet to another router that most li kely contains information about the destination.

D. The router returns the packet to the source device with the explanation that the destination was unreachable. Question 11: Which of the following contains a unique network number that is used in routing? A. MAC address B. physical address Answer:. IP address D. NIC card Question 12: Which protocol is used to dynamically assign IP addresses? Answer:. DHCP B. ARP C. proxy ARP D. IGRP Question 13: Connection-oriented network processes are often referred to as what? A. packet switched B. segment switched Answer:. circuit switched D. network switched Question 14: Which describes the changes made to a packet's IP destination address, as that packet is passed from router to router on it's way to the destination host? A. The destination IP address changes each hop, to be the address of the next router. B. The destination IP address changes anytime a router is sending the packet over a WAN. C. The destination IP address will always be the address of the first router. Answer:. The destination IP address never changes. Question 15: Which protocol can find the MAC address of a computer given its IP address? A. RARP B. DHCP Answer:. ARP D. Proxy RARP Question 16: Why is a static route the preferred method for reaching stub networks? Answer:. static routing requires less overhead B. static routing requires more overhead on the network C. this allows routers to adjust to changes in the network D. the routes are learned automatically Question 17: What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer:. proxy ARP B. proxy RARP C. RARP D. subnetting

Question 18: Which is an example of a routed protocol? A. RIP Answer:. IPX/SPX C. EIGRP D. OSPF Question 19: IP relies upon which OSI layer protocol to determine whether packets have been lost and request retransmission? A. application B. presentation C. session Answer:. transport Question 20: What do routers use to exchange routing tables and share route information? A. routed protocols B. transport protocols Answer:. routing protocols D. UDP protocols Question 21: Which type of routing allows routers to adjust to changing network conditions? A. static Answer:. dynamic C. automatic D. stub Question 22: Which of the following is an example of an IGP (Interior Gateway Protocol)? A. IPX B. SPX C. UDP Answer:. IGRP Question 23: In a connectionless system, which of the following is correct? Answer:. The destination is not contacted before a packet is sent. B. The destination is contacted before a packet is sent. C. A connectionless connection is established with the recipient before a packet is sent. D. A non-connection is established between the sender and recipient before a packet is sent. Question 24: Which is a network layer protocol that can be routed? Answer:. IP B. ISP C. NetBEUI D. ARP Question 25: What are the two proprietary routing protocols developed by Cisco? A. RIP and OSPF Answer:. IGRP and EIGRP

C. D.

IPX and SPX TCP and IP

Question 26: When configuring a host computer, which of the following describes the router interface that connects to the same network segment? A. default interface Answer:. default gateway C. default port D. default subnet Chapter 12+13+14 (have no ) Question 1: Which of the following is a main function of the presentation layer? A. dialogue control B. managing applications C. windowing D. data compression Question 2: Which simple protocol exchanges datagrams, without acknowledgements or guarantee d delivery? A. TCP B. ASP C. TCP/IP D. UDP Question 3: What is the correct term for the orderly initiation, termination, and managing o f communication? A. dialogue separation B. dialogue control C. segmentation D. expectational acknowledgement Question 4: Which layer of the OSI model is responsible for the compression of files? A. transport B. session C. presentation D. application Question 5: What type of tion? A. two-way B. two-way C. two-way D. one-way communication is used when two messages can cross during a conversa simultaneous continuous alternate alternate

Question 6: What is the term used when sound files are downloaded while they are playing? A. Musical Instrument Digital Interface B. EBCDIC C. video streaming D. streaming audio Question 7: Which term refers to the amount of data that can be transmitted before receiving

an A. B. C. D.

acknowledgement? window size closed connection two way handshake expectational acknowledgement

Question 8: What is it called when the session layer decides whether to use two-way simultan eous or two-way alternate communication? A. expectational acknowledgement B. dialogue separation C. resynchronization D. dialogue control Question 9: If one system uses EBCDIC and a second system uses ASCII, which layer provides t he translation between the two different types of code? A. Layer 6 B. Layer 5 C. Layer 4 D. Layer 3 Question 10: What file format acts as a set of directions that tell a web browser how to disp lay and manage documents? A. HTML B. HTTP C. MIDI D. JPEG Question 11: Since TCP reassembles segments into complete messages, what happens if a sequenc e number is missing in the series? A. The segment is dropped. B. The missing segment is re-transmitted. C. All segments are retransmitted from the beginning. D. Sequence numbers are never checked when using TCP. Question 12: Which ports are reserved by TCP and UDP for public applications? A. numbers from 255 to 1023 B. numbers below 255 C. numbers above 1023 D. numbers from 0 to 1023 Question 13: Which layer is responsible for data encryption? A. Layer 7 B. Layer 6 C. Layer 5 D. Layer 4 Question 14: Which of the following would describe Transmission Control Protocol? A. unreliable B. connection-oriented C. connectionless D. Layer 3 Question 15:

What is the correct term for the sequence that synchronizes a connection at both ends before any user data is exchanged? A. closed connection B. segment retransmission C. three-way handshake D. sliding windows Question 16: The session layer establishes, manages, and terminates sessions between ________ _____. A. networks B. servers C. applications D. media Question 17: What type of A. two-way B. two-way C. two-way D. one-way communication avoids interrupts by taking turns? simultaneous symmetric alternate continuous

Question 18: Which of the following is a characteristic of TCP? A. unreliable B. connectionless C. divides outgoing messages into segments D. provides no software checking for segments Question 19: Which layer of the OSI model has the primary duty of regulating the flow of info rmation from source to destination reliably and accurately? A. presentation B. session C. transport D. network Question 20: Which of the following would be an example of an important Layer 5 protocol? A. OSPF B. NFS C. IGRP D. FTP Question 21: What is ASCII and EBCDIC used to format? A. graphics B. text C. digitized music D. video Question 22: What are two file formats used by the Internet applications to display still ima ges? A. WAV and HTML B. PICT and MIDI C. GIF and JPEG D. MPEG and TIFF

Question 23: Which layer of the OSI model is responsible for presenting data in a form that t he receiving device can understand? A. transport B. session C. presentation D. application Question 24: At which OSI layer does TCP operate? A. Layer 4 B. Layer 5 C. Layer 6 D. Layer 7 Question 25: In a TCP segment, which field defines the number of octets a recipient is willin g to accept? A. flag B. checksum C. window D. HLEN Chapter 15 Question 1: In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer:nswer:. the domain B. the protocol to be used C. the type of resource to contact D. the folder Question 2: The Telnet application works mainly at which layers of the OSI model? A. application and presentation Answer:nswer:. application, presentation, and session C. presentation and session D. presentation, session, and transport Question 3: Which application layer protocol supports e-mail programs? A. SNMP Answer:nswer:. POP3 C. TFTP D. Telnet Question 4: What is the language used to create web pages? A. HTTP Answer:nswer:. HTML C. GIF D. ASCII Question 5: What is an example of an application that requires both a client and server comp onent in order to function? Answer:nswer:. web browser B. Microsoft Word C. ASCII D. PICT

Question 6: If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer:nswer:. redirector B. file locator C. StorFil D. SNMP Question 7: Which of the following allows for routing that is based on classes of address, r ather than individual addresses? A. DNS address B. MAC address C. WINs address Answer:nswer:. IP address Question 8: Which protocol is designed to download or upload files on the Internet? A. SNMP B. Telnet Answer:nswer:. FTP D. HTTP Question 9: Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? A. transport B. session C. presentation Answer:nswer:. application Question 10: Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? A. extender B. TCP Answer:nswer:. redirector D. Uniform Resource Locator Question 11: Which connection is made to a server and maintained until the user terminates th e connection? A. printing a file from a web page B. an FTP connection Answer:nswer:. downloading a web page D. processing a web transaction Question 12: What type of server is used to translate a domain name into the associated IP ad dress? A. FTP Answer:nswer:. DNS C. TFTP D. DHCP Question 13: E-mail addresses consist of which two parts? Answer:nswer:. recipient's username and postoffice address B. InterNIC name and postoffice address

C. D.

server ID and router ID Electronic portfolio and IP address

Question 14: Which OSI layer does not provide support for any other OSI layer? Answer:nswer:. application B. session C. network D. physical Question 15: Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? A. network redirector Answer:nswer:. hyperlink C. web browser D. ASCII Exam Exam1 Question 1: What is the data-link destination address of a broadcast message? A. 111.111.111.111 B. 255.255.255.255 C. AAAA.AAAA.AAAA Answer:nswer:. FFFF.FFFF.FFFF Question 2: What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? A. The name server looks at the request and replies with the MAC address of ho st B. B. All devices look at the request and any device will reply with the IP addre ss of host B. Answer:nswer:. All devices look at the request and ONLY host B will reply with the MAC address. D. The nearest router looks at the request and replies with the MAC address of host B or forwards the request to another router. Question 3: Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? A. Application B. Presentation Answer:nswer:. Session D. Transport Question 4: Which best describes the structure of a MAC address? A. 16 bit network code plus 16 bit serial number B. 16 bit vendor code plus 16 bit serial number Answer:nswer:. 24 bit vendor code plus 24 bit serial number D. 24 bit network identity plus 24 bit host identity Question 5: Which best describes the function of the Physical Layer? A. Provides network services to user applications. B. Establishes, maintains, and manages sessions between applications. C. Uses a MAC address to provide transmission across media and handles error n

otification, network topology, and flow control. Answer: Provides electrical, mechanical, procedural and functional means for a ctivating and maintaining links between systems. Question 6: What best describes the functions of the Application Layer? A. Establishes, manages, and terminates applications B. Supports communicating components of applications such as e-mail Answer:nswer:. Defines end-to-end delivery of packets D. Translates between different data formats such as ASCII and EBCDIC Question 7: What happens after a collision has occurred on a network after the jam signal is sent? A. The router clears the route and notifies the source to resend Answer:nswer:. All stations stop sending frames for a randomly selected time p eriod C. A keepalive signal is generated to hold the message until the route clears D. The source station waits for the collision to dissipate and then broadcasts an all clear Question 8: Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? A. Hub B. Bridge Answer:nswer:. Ethernet switch D. Router Question 9: Why has a layered network model been developed? A. Stabilizes development times and reduces number of proprietary hardware sch emes. B. Takes a holistic approach to networking and encourages comprehensive engine ering solutions. Answer:nswer:. Accelerates evolution, ensures interoperable technology and fac ilitates modular engineering. D. Increases complexity and flexibility to deal with multiple sources of hardw are. Question 10: Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? Answer:nswer:. Windowing B. Broadcasting C. Error recovery D. Collision avoidance Question 11: If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? A. 2 B. 6 Answer:nswer:. 14 D. 30 Question 12: During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss?

A. Recovery and flow control B. Encapsulation and broadcasting Answer:nswer:. Acknowledgement and retransmission D. Synchronization and acknowledgement Question 13: Which Layer of the OSI model is concerned with the topology of a network? A. Transport B. Network Answer:nswer:. Data Link D. Physical Question 14: Which network device provides internetworking and broadcast control? A. Hub B. Bridge C. Ethernet switch Answer:nswer:. Router Question 15: Where is the Layer 2 address found on a workstation? A. In the routing table Answer:nswer:. On the network interface card C. In the name server table D. It is located on the DHCP server Question 16: What are the most common LAN technologies used in networking today? A. Ethernet, token ring, DecNET Answer:nswer:. Ethernet, token ring, FDDI C. Ethernet, DecNET, FDDI D. Ethernet, token ring, ARCnet Question 17: Which of the following is true about a CSMA/CD network? A. Signals are always sent in multi-frame broadcast mode. B. One node's transmission goes to the nearest router that sends it directly t o the destination. C. Signals are sent directly to the destination if both the MAC and IP address es are known by the source. Answer: One node's transmission traverses the entire network and is seen and che cked by every node. Question 18: Which Layer of the OSI model provides data representation and code formatting? A. Application Layer Answer:nswer:. Presentation Layer C. Session Layer D. Transport Layer Question 19: What correctly describes the five conversion steps of data encapsulation? Answer:nswer:. Data-segments-packets-frames-bits B. Data-packets-segments-frames-bits C. Data-frames-segments-packets-bits D. Data-segments-frames-packets-bits Question 20: Which OSI Layer determines best path selection?

A. Transport Layer Answer:nswer:. Network Layer C. Data Link Layer D. Physical Layer Question 21: Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? Answer:nswer:. There will be no response. B. The router will respond with the MAC address of host Z. C. The router will respond with it's own MAC address. D. The router will forward the request to the correct subnet so host Z can res pond. Question 22: Which Layer of the OSI model handles data encryption? A. Application Answer:nswer:. Presentation C. Session D. Transport Exam2 Question 1: Routers make forwarding decisions based on which kind of address? Answer:nswer:. logical B. layer 2 C. physical D. hardware Question 2: Which Cisco IOS command is used to enter privileged mode? A. admin B. root Answer:nswer:. enable D. privileged Question 3: What is the default user-mode prompt for a Cisco router? A. # B. Router Answer:nswer:. Router> D. Router% Question 4: What do WAN Data link protocols describe? A. The electrical, mechanical, operational, and functional connections B. The process used for error detection Answer:nswer:. How frames are carried between systems D. How applications are started and stopped Question 5: What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? A. It indicates that you are in help mode B. It indicates that you are in privileged mode Answer:nswer:. It indicates the location of an error in a command string D. It indicates that more information must be entered to complete the command Question 6: What best describes Frame Relay?

Answer:nswer:. Uses high quality digital facilities with no error correction B. Digital service that transmits voice and data over existing telephone lines C. Provides router-to-router and host-to-network connections over synchronous and asynchronous circuits D. Supports point-to-point and multipoint configurations over high speed analo g circuits Question 7: Which layers of the OSI model do WAN standards describe? A. Data link and network B. Network and transport C. Physical and application Answer:nswer:. Physical and data link Question 8: Which is an example of a data circuit terminating equipment (DCE)? Answer:nswer:. Modem B. Computer C. Router D. Multiplexer Question 9: What is the prompt of a Cisco router in the priviledged mode? A. Router> Answer:nswer:. Router C. Router(config-if) D. Router(config-router) Question 10: Which packet-switched service is more efficent than X.25? Answer:nswer:. Frame Relay B. Digitial Subscriber Line C. Asynchronous Transfer Mode D. Switched Multimegabit Data Service Question 11: If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? A. Help Answer:nswer:. ? C. CTRL-H D. CTRL-P Question 12: What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? A. The end key B. The tab key Answer:nswer:. The spacebar D. The page down key Question 13: Which memory component of a router loses its content when the router is turned o ff? Answer:nswer:. RAM B. ROM C. FLASH D. NVRAM

Question 14: What can only be done in privileged mode on Cisco routers? A. Enter Commands B. Check routing tables C. Monitor performance Answer: Change the configuration Question 15: Which character is used to enter the help mode? A. ! Answer:nswer:. ? C. * D. % Question 16: Which protocol does a WAN use to make path determination decisions? A. RIP B. IGRP Answer:nswer:. IP D. OSPF Question 17: Which WAN protocol supports point-to-point and multipoint configurations? Answer: HDLC B. CHAP C. PPP D. ISDN Question 18: Which of the following WAN technologies is a Circuit-Switched Service? A. Asynchronous Transfer Mode Answer: Narrowband ISDN C. Frame Relay D. Switched Multimegabit Data Service Question 19: Which of the following WAN technologies is a Cell-Switched Service? A. Frame Relay B. ISDN Answer: Asynchronous Transfer Mode D. POTS Question 20: Which of the following are stored in NVRAM? A. Routing Tables Answer: Configuration Files C. IOS Image D. Power on diagnostics Question 21: What do the WAN Physical Layer standards describe? A. Interface between SDLC and HDLC Answer: Interface between DTE and DCE C. How frames are sent and verified D. How voice and data traffic are routed Question 22: Which keystroke will recall the previous command entry on a Cisco router user in terface? A. Left arrow

B. Right arrow C. Down arrow Answer:. Up arrow Question 23: Which service does a WAN provide to LANs? A. Direct routing with error checking B. IP addressing and secure data transfer C. High speed multiple access to data networks Answer:. Exchange of data packets between routers and the LANs they support Question 24: In which Layer of the OSI Model do WAN routers operate? A. Transport Layer Answer: Network Layer C. Data Link Layer D. Physical Layer Question 25: When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? Answer: User mode B. Enable mode C. Privileged mode D. Global configuration mode Exam3 Question 1: Which Cisco IOS command shows the configuration file stored in NVRAM? A. show version B. show running-config Answer: show startup-config D. show interfaces Question 2: Which external configuration source is used with a modem? A. TFTP Server Answer: AuxiliaryPort C. Console Terminal D. Virtual Terminal Question 3: The show interface serial Cisco IOS router command can display which one of the following lines of information? A. DecNET routing is enabled. B. System image file is c4500-j-mz. Answer: Serial1 is up, line protocol is up. D. IOS (tm) 4500 Software (C4500-J-M), Experimental Version. Question 4: Which router component stores configuration files even when power is off? A. RAM B. ROM C. Flash Answer: NVRAM Question 5: What is the router prompt for the interface configuration mode? A. Router(config)

Answer: Router(config-if) C. Router(config-line) D. Router(config-router) Question 6: Which protocol is used to show summary configuration information about a directl y connected Cisco router? A. Network Control Protocol Answer: Cisco Discovery Protocol C. Address Resolution Protocol D. Transmission Control Protocol Question 7: Which Cisco IOS command is used to show current telnet connections? A. show telnet B. show history C. show version Answer: show sessions Question 8: What is the correct command to go from the user EXEC mode to the privileged EXEC mode? A. login Answer: enable C. interface type number D. configure terminal Question 9: Which Cisco IOS command displays routing table entries? A. ping B. trace Answer: show ip route D. show interface Question 10: What is stored in working RAM and is constantly updated when the router is worki ng properly? A. IOS B. Command Executive Answer: Routing Table D. Active Configuration File Question 11: When is the configuration file loaded into RAM? Answer: Each time the router is initialized B. Each time the routing tables are updated C. Each time the command copy run start is issued D. Each time the router is place in the priviliged EXEC mode Question 12: Which command will indicate the status of IP, IPX, and AppleTalk? A. show version B. show interfaces C. show startup-config Answer: show protocols Question 13: What is the first thing the router does when power is turned on? A. Copies the IOS into RAM Answer: Executes a bootstrap program

C. D.

Configures the interfaces for IP routing Loads the Startup-Configurations file into RAM

Question 14: Which port is used to initially configure a router? A. Auxiliary Answer: Console C. Serial D. BRI Question 15: Which response to the appropriate show command indicates an operational serial l ink? Answer: Serial1 is up, line protocol is up B. Serial1 is up, line protocol is down C. Serial1 is down, line protocol is down D. Serial1 is administratively down, line protocol is down Question 16: Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? A. SETUP Answer: RXBOOT C. Privileged EXEC D. Global configuration Question 17: How many Telnet sessions can a Cisco router have simultaneously? A. 10 B. 7 Answer: 5 D. 1 Question 18: Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? A. show mem B. show flash C. show running-config Answer:nswer:. show startup-config Question 19: Which router component provides working memory for configuration files and routi ng tables? Answer:nswer:. RAM B. ROM C. Flash D. NVRAM Question 20: Which command shows the status of Ethernet, Serial, BRI, and other ports? A. show version Answer:nswer:. show interfaces C. show running-config D. show startup-config Question 21: Which router component is responsible for the power-on bootstrap sequence? A. RAM Answer:nswer:. ROM

C. D.

Flash NVRAM

Question 22: Which command displays information about the current Cisco IOS software version running on a router? A. show stacks Answer:nswer:. show version C. show interface D. show startup-config Question 23: In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? A. Layer 1 Answer:nswer:. Layer 2 C. Layer 3 D. Layer 4 Exam 4 Question 1: Which Cisco IOS command displays the backup configuration file stored in NVRAM? A. Router#show flash B. Router#show nvram C. Router#show running-config Answer:nswer:. Router#show startup-config Question 2: While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? A. pound signs - example #yes# B. parentheses - example (yes) C. percent signs - example %yes% Answer:nswer:. square brackets - example [yes] Question 3: What is the first global configuration parameter set when using the setup mode? A. enable password B. routing protocol Answer:nswer:. host name of the router D. interface configuration Question 4: What is the function of the erase startup-config command? A. It deletes the current IOS from NVRAM B. It deletes the configuration file in RAM Answer:nswer:. It deletes the configuration file in NVRAM D. It deletes the bootstrap image from Flash memory Question 5: You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? A. copy config startup-config Answer:nswer:. copy running-config startup-config C. configure memory D. copy running-confignvram Question 6: Which command will save an active configuration? A. config t

B. config memory C. copy startup-config running-config Answer:nswer:. copy running-config startup-config Question 7: How does the router prompt appear when you are in global configuration mode? A. Router B. Router-config Answer:nswer:. Router(config) D. Router(config-router) Question 8: Where is the next place a router looks if it cannot find the IOS image in flash? A. RAM B. ROM Answer:nswer:. TFTP D. NVRAM Question 9: What is the function of the reload command? Answer:nswer:. It reboots the router B. It saves the new IOS to Flash memory C. It loads a new configuration file in NVRAM D. It loads a configuration file from a TFTP server Question 10: Which of the following is the correct order in which a router boots and looks fo r files? 1. Bootstrap from ROM 2. Config from NVRAM 3. Config from setup 4. Config from tftp 5. IOS from flash 6. IOS from ROM 7. IOS from tftp A. 5,7,6,1,2,4,3 B. 1,5,7,6,3,2,4 C. 1,2,5,4,3,7,6 Answer:nswer:. 1,5,7,6,2,4,3 Question 11: When setting passwords for vty 0 4, what are you setting a password for? A. Modem connections B. Line consoles Answer:nswer:. Telnet sessions D. Remote host router Question 12: What is an important function of the power-up self test (POST)? A. Causes other instructions to be loaded into memory Answer:nswer:. Executes diagnostics that verify the basic operation of router hardware C. Determines the router hardware and software components and lists them on th e console terminal D. Starts routing processes, supplies addresses for interfaces, and sets up me dia characteristics Question 13: Which password is encrypted in the configuration file by default? A. Console

B. Enable Answer:nswer:. Enable secret D. Virtual terminal Question 14: Which command is used to backup the active configuration file from a router to a network server? A. copy tftp startup-config Answer:nswer:. copy running-configtftp C. copy tftp flash D. copy NVRAM tftp Question 15: What is an important result of the configuration file loading onto a router? A. Causes other instructions to be loaded into memory B. Executes diagnostics that verify the basic operation of router hardware C. Determines the router hardware and software components and lists them on th e console terminal Answer:nswer:. Starts routing processes, supplies addresses for interfaces, an d sets up media characteristics Question 16: Where is the configuration file saved when you complete the setup process? A. RAM B. ROM Answer:nswer:. NVRAM D. TFTP Server Question 17: Once you have selected an interface to configure, which prompt would be on the s creen? A. Router(config)# B. Router(config-in)# C. Router(config-intf)# Answer:nswer:. Router(config-if)# Question 18: You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? A. banner msg Answer:nswer:. banner motd C. daily msg D. daily motd Question 19: Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? A. ESC Answer:nswer:. CTRL-C C. CTRL-ESC D. CTRL-SHIFT-6 , X Exam 7+8 Question 1: Which command is used to copy a system image to a network server? Answer:nswer:. Router#copy flash tftp B. Router#copy tftp flash C. Router(config)# copy flash tftp D. Router(config)# copy tftp flash

Question 2: Which configuration register mode is used to tell the router to boot from ROM? A. 0x---0 Answer:nswer:. 0x---1 C. 0x---2 D. 0x---3 Question 3: Which command is used to tell the router to boot from flash? A. Router#boot flash IOS_filename B. Router#boot system flash IOS_filename C. Router(config)# boot flash IOS_filename Answer:nswer:. Router(config)# boot system flash IOS_filename Question 4: Which command can be used to check the amount of system memory available? Answer:nswer:. Router#show flash B. Router#show interface C. Router#show register D. Router#show running-config Question 5: In the Cisco IOS name cpa25-cg-1, what does cg represent? A. Where the image runs B. Platform on which the image runs Answer:nswer:. Special capabilities and feature sets D. Whether the image has been compressed Question 6: Where will the router search for the IOS software if there are no boot system commands in NVRAM? A. ROM B. RAM Answer:nswer:. Flash D. TFTP server Question 7: Which command is used to change the default configuration register setting? A. Router#register value B. Router#config-register C. Router(config)#register value Answer:nswer:. Router(config)# config-register Question 8: Which command is used to tell the router to boot from ROM? A. Router#boot system rom B. Router#boot system rom IOS_filename Answer:nswer:. Router(config)# boot system rom D. Router(config)# boot system rom IOS_filename Question 9: Which command is used to tell the router to boot from a network server? A. Router#boot tftpIOS_filenameip address B. Router# boot system tftpIOS_filenameip address C. Router(config)# boot tftpIOS_filenameip address Answer:nswer:. Router(config)#boot system tftpIOS_filenameip address

Question 10: Which configuration register is used on a Cisco 2500 series router during password recovery? A. 0x2100 B. 0x2101 C. 0x2102 Answer:nswer:. 0x2142 Question 11: You are upgrading the IOS on a router, which command would be used to copy the new IOS image from a network server? A. Router# copy flash tftp Answer:nswer:. Router#copy tftp flash C. Router#copy startup-configtftp D. Router# copy tftp startup config Question 12: Which of the following correctly describes a method for specifying how a router loads the Cisco IOS software? Answer:nswer:. Designate fallback sources for the router to use in sequence from NVRAM. B. Configure the Cisco IOS software image for the location where it will bootstrap. C. Manually boot a default system image at a virtual terminal. D. Manually boot a default system image at the network server. Question 13: Which of the following is NOT part of the Cisco IOS naming convention? A. Where the image runs B. Platform on which the image runs C. Special capabilities and feature sets Answer:nswer:. Amount of space the file will use when copied to NVRAM Question 14: Which step should be performed before copying software between the TFTP host and Flash memory? A. Use the show Flash command to check connectivity to the server B. Check that you can see and write into RAM memory Answer:nswer:. Verify that there is sufficient room in Flash to accommodate th e IOS D. Check the configuration file name and location on the network server Question 15: In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? A. Where the image runs Answer:nswer:. Platform on which the image runs C. Special capabilities and feature sets D. Whether the image has been compressed Question 16: Where does the router search for the IOS software if the Flash is empty? A. ROM B. RAM C. NVRAM Answer:nswer:. TFTP server Question 17:

Which of the following is provided by the show version command? A. Information about the IP addresses of the interfaces B. Information about the routing protocol Answer:nswer:. Information about the system image file D. Information about the default gateway Question 18: Which command is used to discover the configuration register setting? A. show register B. show running-config Answer:nswer:. show version D. show startup-config Question 19: Which command is used to configure a routing protocol? A. Router# rip network 192.11.10.0 Answer:nswer:. Router(config)# router rip C. Router(config)# routing rip D. Router(config)#routing protocol rip Question 20: Which configuration register mode is used to tell the router to boot from NVRAM? A. 0x---0 B. 0x---1 Answer:nswer:. 0x---2 D. 0x---N Question 21: Which command can be used to check the boot field setting? Answer:nswer:. Router# show version B. Router# show register C. Router#show running-config D. Router# show startup-config Question 22: Which configuration register mode is used to tell the router to boot from ROM monitor mode? Answer:nswer:. 0x---0 B. 0x---1 C. 0x---2 D. 0x---3 Question 23: Which command is Answer:nswer:. B. Router#show C. Router#show D. Router#show Exam 9+10 Question 1: Which of the following best describes the TCP/IP protocol stack? A. Transfers information in a sequence of datagrams. Answer:nswer:. Enables communication among any set of interconnected networks. C. Maps closely to the OSI reference model in the upper layers. D. Reassembles datagrams into complete messages at the receiving location. used to view the name of the system image file? Router#show flash register running-config startup-config

Question 2: What is the purpose of ICMPs? A. They put the internetwork in control mode so that protocols can be set up. B. They are messages that the network uses to monitor connection protocols. C. They are standard binary messages that act as model internetwork protocols. Answer:nswer:. They are messages carried in IP datagrams used to send error an d control messages. Question 3: If a router has a serial interface S0, with IP address 107.85.20.2, using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? Answer:nswer:. 107.85.20.15 B. 107.85.20.255 C. 107.85.255.255 D. 107.255.255.255 Question 4: What will the source do if it is using a window size that is too large for the destination to handle and does not receive an acknowledgement from the destination? Answer:nswer:. Resend the data B. Stop sending data C. Confirm the window size with the destination D. Query the destination to see if the line is still up Question 5: If you want to turn off the name-to-address translation in the router, which command would you use? A. no ip host B. no ip address C. no ip name-search Answer:nswer:. no ip domain-lookup Question 6: If you want to specify one or more hosts that supply host name information, which command would you use? A. ip host B. ip address Answer:nswer:. ip name-server D. ip domain-lookup Question 7: In the output of show hosts , what does perm mean? A. The entry has not yet expired. B. The entry was acquired from DNS use. C. The entry was learned from DNS and now has permanent status. Answer:nswer:. The entry was manually configured in a static host table. Question 8: What provides sequencing of segments with a forward reference acknowledgment, numbers datagrams before transmission, and reassembles the segments into a complete message? A. Simple UDP acknowledgment B. Expectational acknowledgments

Answer:nswer:. TCP sequence and acknowledgment numbers D. Header checksums and data protocol checksums Question 9: Which protocol is found in the Transport Layer? A. IPX B. LLC C. RIP Answer:nswer:. UDP Question 10: What is the purpose of the protocol field? A. Allows dynamic generation of source protocols B. Changes other protocols so that they can be used by IP C. Numbers the Layer 3 protocol and makes it similar to a port number Answer:nswer:. Determines the Layer 4 protocol being carried within an IP datagram Question 11: What does the response * mean, when it comes in response to the trace command A. The network refused the trace. Answer:nswer:. Timed out waiting for trace reply. C. The destination device refused the trace. D. The source used a trace that was not supported by the network protocol. Question 12: If you want to associate a name with an IP address, such as asu 129.219.2.1, what command structure would you use? A. ip name asu 129.219.2.1 Answer:nswer:. ip host asu 129.219.2.1 C. ip host name asu 129.219.2.1 D. ip host address asu 129.219.2.1 Question 13: What best describes the function of broadcast addresses? Answer:nswer:. Used to send a message to all nodes on a network/subnet. B. Used to send a message to a single network destination. C. Used to send a message to every node the router has access to. D. Used to send a message to every router on a network in a WAN. Question 14: Which command locates path failures from the source to destination? A. ARP B. Ping Answer:nswer:. Trace D. Telnet Question 15: What is the function of ARP? A. It is used to map a known MAC address to an unknown IP address. B. It is used to develop a cached Layer 4 address resource table. Answer:nswer:. It is used to map a known IP address to an unknown MAC address. D. It sends a broadcast message looking for the router IP address

Question 16: If a device on a network does not know its Layer 3 address how can it find it?

A. ARP Answer:nswer:. RARP C. Sends an alert to the network administrator. D. Broadcasts a request to the Domain Name Server (DNS) for help. Question 17: If Host A is setting sends a segment with to send back to Host A. n B. n1 C. n + n Answer:nswer:. n + up a three-way handshake with Host B, and Host A sequence number n to Host B, what is Host B going A as an acknowledgment?

Question 18: Which of the following best describes TCP/IP? A. 7 Layer Model that enables communication among any set of interconnected networks B. Proprietary protocol that can only be used with WANs C. Proprietary protocol that can only be used with LANs Answer:nswer:. Allows communication among a variety of interconnected networks and can be used in both LANs and WANs Question 19: What is one way port numbers are used? A. Source systems generate port numbers to predict destination addresses. Answer:nswer:. To keep track of different conversations crossing the network a t the same time. C. Source systems use port numbers to keep session organized and to select the proper application. D. End systems use port numbers to dynamically assign end users to a particular session, depending on their application use. Question 20: What is the purpose of ICMP testing? Answer:nswer:. Determines if messages reach their destination B. Makes sure that all activity on the network is being monitored C. Determines if the network is in privileged mode or user mode Question 21: Which layer in the TCP/IP model includes file transfer, e-mail, remote login, and network management? Answer:nswer:. Application B. Transport C. Internet D. Network Question 22: How does the Cisco IOS software deal with name-to-address mappings? A. It does not use name-to-address mappings. B. It takes each IP address and assigns a unique name to it. C. It identifies the subnet mask being used at the destination site and routes data there. Answer:nswer:. It maintains a cache of host name-to-address mappings for use b y commands.

Question 23: A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the destination host? A. 172.16.1.0 B. 172.16.4.0 Answer:nswer:. 172.16.8.0 D. 172.16.12.0 Question 24: At which Layer of the OSI model would flow control problems exist? A. Application B. Presentation C. Session Answer:nswer:. Transport Question 25: How are IP addresses usually expressed? A. Binary code B. 4 octet subnet mask Answer:nswer:. 32-bit dotted decimal D. Transmission control protocol Exam 11 1 Which kind of route is set when the next hop is not explicitly listed in the r outing table? Dynamic Answer: Default Passive Incremental 2 How can the count to infinity problem be prevented? By using routing loops By defining a minimum hop count By increasing router memory Answer:nswer:y using hold-down timers 3 Information regarding routes has been received on a router through interface A . Which routing technique will prevent this information from exiting on the rout er through the same interface A? Dynamic routing Answer:Split horizon Static routing Hold down timers 4 How are link-state routing updates triggered? By timers Answer:nswer:y topology changes By protocol changes By changing the NIC 5 What is one disadvantage of dynamic routing? Answer:Requires lots of active network administrator management Can reveal everything known about an internetwork

Must be reconfigured if the network is changed or stations are added Cannot compensate for network failures so crashes can be a recurring problem 6 Which protocol is a link-state routing protocol? EIGRP Answer:OSPF RIP IGRP 7 Which metrics are commonly used by routers to evaluate a path? EMI load, SDLC connections, deterioration rate Answer:nswer:andwidth, load, reliability Distance, hub count, SN ratio Signal count, loss ratio, noise 8 Which routing protocol maintains a complex database of topology information an d uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 9 Which best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork When several messages are being sent to the same destination 10 Which term describes the situation where packets never reach their destinatio n but instead cycle repeatedly through the same group of network nodes? Split horizon End to end messaging Convergence Answer:Routing loop 11 Which routers exchange information when using a distance-vector routing proto col? All All in network All in subnetwork Answer:Only neighbors 12 What is one disadvantage of static routing? Requires a name server on each network Routing of data stops while routers exchange routing tables Answer:The network administrator must manually update the routing table wheneve r a topology change occurs Tends to reveal everything known about an internetwork 13 Which OSI Layer is responsible for path determination? 1

2 Answer:3 4 14 What is one advantage of dynamic routing? Takes little network overhead and reduces network overhead traffic Reduces unauthorized break-ins as security is tight Answer: Adjusts automatically to topology or traffic changes Requires very little bandwidth to operate efficiently 15 What will happen if routers have different sets of LSAs? A check sum procedure is initiated and faulty routing tables repaired. Answer:Routes become unreachable because routers disagree about a link. A comparison is forced and subsequent convergence on a single routing table occ urs. A broadcast message is sent with the master copy of the routing table to all ro uters. 16 What do distance vector algorithms require of routers? Default routes for major internetwork nodes in case of corrupted routing tables Answer:Periodically send its routing table to its neighbors Fast response times and ample memory Maintain a full database of internetwork topology information 17 What does a router use to identify the destination network (LAN) of a packet within an internetwork? MAC address Port address SPX address Answer:Network address 18 Which protocol is a hybrid routing protocol? Answer:EIGRP OSPF RIP IGRP 19 What is a network with only one path to a router called? Static network Dynamic network Entity network Answer:Stub network 20 Which part(s) of an IP address is used by the router for path determination? Answer:Network Network and client Network, subnetwork, and host Network, subnetwork, host, and subnet mask 21 Which metric measures the passage of a data packet through a router? Exchange

Answer:Hop Transmittal Signaling Exam12 1 Which command should identify destination network addresses and next hop pairs ? Router(config)# show ip protocol Router#show ip table Answer:Router> show ip route Router(config-router)# show ip table 2 Which task is configured globally? Addressing IP network numbers by specifying subnet values Answer:Selecting a routing protocol like RIP or IGRP Assigning network/subnet addresses and the appropriate subnet mask Setting up a routing metric to find the best path to each network 3 Which command specifies the directly connected networks after an IP routing pr otocol has been enabled? Router(config-if)> network network number Router(config)# network network number Answer:Router(config-router)# network network number Router(config-router)# network ip address subnet mask 4 If a new LAN is added to an internetwork, which command would add the network to the routing table? Router (config)>ip route 2.0.0.0 255.0.0.0 via 1.0.0.2 Answer:Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Router (config)# ip route 2.0.0.0 via 1.0.0.2 Router (config)# ip route 2.0.0.0 1.0.0.2 using 255.0.0.0 5 After using the router igrp command, why is it necessary to use the network su bcommand? It displays the contents of the network routing table It allows each router to send its routing table in routing updates to all the n etworks It displays the status and global parameters associated with a network Answer:It specifies any directly connected networks to be included in routing t able updates 6 Which metric is used in RIP? Bandwidth Delay Answer:Hop count Traffic load 7 Which routes are automatically determined by the routers? Static routes Default routes Answer:nswer:ynamic routes Gateway routes

8 Which type of route is used when no other routes are known to the destination? Static Answer:nswer:efault Dynamic Next available 9 How often are RIP updates broadcast? Every 15 seconds Answer:Every 30 seconds Every 60 seconds Every 90 seconds 10 What is the purpose of the ip default-network command? Answer:It is used to establish a default route It is used to save time when setting up the routing table It is used to save bandwidth when sending large datagrams It is used to keep routing table short and organized 11 What is used to measure the trustworthiness of a route? Reliability index Number of hops Answer:nswer:dministrative distance Available bandwidth 12 At which OSI Layer would an incorrect subnet mask on an interface be classifi ed? Layer 4 Answer:Layer 3 Layer 2 Layer 1 13 Which variable is used by IGRP? Answer:nswer:andwidth File size Hop length Time span 14 Which type of system occurs when routers are grouped under a common administr ation? Default Answer:nswer:utonomous Static Dynamic 15 At which Layer of the OSI model would you classify the loss of network connec tivity due to a loose patch cable? Layer 7 Layer 5 Layer 3 Answer:Layer 1

16 Which command should display RIP routing updates as they are sent and receive d? Router#show ip rip Router#debug ip protocols Answer:Router# debug ip rip Router# show ip rip update 17 What is the purpose of exterior routing protocols? To transmit between nodes on a network To deliver information within a single autonomous system Answer:To communicate between autonomous systems To set up a compatibility infrastructure between networks 18 What type of route is configured with the command: ip route 172.16.1.0 255.25 5.255.0 172.16.2.1 Answer:Static Default Dynamic Gateway 19 What is the interval of IGRP routing updates? 30 seconds 60 seconds Answer:90 seconds 120 seconds 20 At which OSI Layer would an incorrect encapsulation type on a serial interfac e be classified? Layer 4 Layer 3 Answer:Layer 2 Layer 1 21 Which mode is entered if a valid startup-configuration file is not found afte r the IOS image is loaded? Answer:Setup Static Dynamic Automatic Exam final: 1 What provides sequencing of segments with a forward reference acknowledgment, numbers datagrams before transmission, and reassembles the segments into a compl ete message? Simple UDP acknowledgment Expectational acknowledgments Answer:TCP sequence and acknowledgment numbers Header checksums and data protocol checksums 2 Which command will restart CDP if it has been disabled on the interface of a r outer?

Activate CDP Answer:nswer:DP enable Enable CDP Enable interface 3 Which statement is true of the count to infinity problem in routing loops? It is caused by the split horizon problem. It is a result of the packet's TTL value becoming too great. Only routers that use hybrid routing can overcome this problem. Answer:Routers that use hold down timers can overcome the problem. 4 What is the purpose of the IOS enable secret command? To allow the user to establish password protection on incoming Telnet sessions To allow the user to establish password protection on the console terminal To enable the user to access the User mode Answer:To enable the user to enter a password that will be encrypted 5 How are link-state routing updates triggered? By timers Answer:nswer:y topology changes By protocol changes By changing the NIC 6 Which item best describes the difference between a routed protocol versus a ro uting protocol? Routed protocols are used between routers to maintain tables while routing prot ocols are used to carry user data. Routed protocols use distance vector algorithms while routing protocols use lin k-state algorithms. Answer:Routed protocols are used to carry user data while routing protocols mai ntain tables. Routed protocols use dynamic addressing while routing protocols use static addr essing. 7 Which type of network would typically use a static route for external traffic? Fully meshed network Multihomed network Network with frequent topology changes Answer:Stub network 8 What determines how much data a receiving station running TCP/IP can accept be fore sending an acknowledgment? Protocol size Sequence numbers Transmission rate Answer:Window size 9 Which term refers to the amount of data that can be transmitted before receivi ng an acknowledgement? Answer:window size closed connection two way handshake

expectational acknowledgement 10 If a router has a serial interface S0 with IP address 107.85.20.2 using a sub net mask of 255.255.255.240, what is the broadcast address used for hosts on thi s subnet? Answer:107.85.20.15 107.85.20.255 107.85.255.255 107.255.255.255 11 Which device is normally an example of data circuit terminating equipment (DC E)? Answer:Modem Computer Router Multiplexer 12 Which command can be used to check the boot field setting? Answer:Router#show version Router#show register Router#show running-config Router# show startup-config 13 Which command is used to backup the active configuration file from a router t o a network server? copy tftp startup-config Answer:nswer:opy running-configtftp copy tftp flash copy tftp NVRAM 14 What is the function of the reload command? Answer:It reboots the router It saves the new IOS to Flash memory It loads a new configuration file in NVRAM It loads a configuration file from a TFTP server 15 Which statements are true when configuring a router to operate with RIP? At the global configuration prompt issue the command "router rip." Then set up the IP address and subnet mask on each interface. Answer:nswer:t the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly c onnected network. At the global configuration prompt issue the command "rip." Then use the "netwo rk" command to indicate which network(s) to advertise. At the global configuration prompt issue the command "enable rip routing." Then set up the IP address and subnet mask on each interface. 16 What is a typical OSI layer 2 error? Broken cable Cable connected to the wrong port Answer:Improper clock rate settings on serial interfaces Incorrect subnet mask

17 What is the first step a Cisco router performs after it is powered up? Empties contents of NVRAM Looks for the configuration file Answer:Performs a POST Starts the operating system 18 Which type of protocol controls how and when routers communicate with neighbo ring routers? Media access layer protocol Routed protocol Answer:Routing protocol Transport protocol 19 Which item best defines the ping command? Checks for connectivity at the application layer. Answer:Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Uses TTL values to generate messages from each router used along a path. Verifies the sliding window is set up properly. 20 Which configuration register mode causes a router to boot from the ROM monito r mode? Answer:0x---0 0x---1 0x---2 0x---3 21 Which metric is used in RIP? Bandwidth Delay Answer:Hop count Traffic load 22 What is exchanged to provide communication between two hosts' source and dest ination OSI peer layers? Packet datagrams Answer:Packet data units Protocol datagrams Protocol data units 23 Which router component provides working memory for configuration files and ro uting tables? Answer:RAM ROM Flash NVRAM 24 Which listing BEST describes commands that can be used to test a network? Show ip route, Show ip route, Show ip route, Answer:Show ip show interfaces, debug, telnet, network test, ping show interfaces, trace, ping, display network, debug debug, trace, ping, telnet, show ip trace route, show interfaces, debug, trace, ping, telnet

25 How can a router learn a path to a destination? ARP tables DNS entries Answer:nswer:ynamic routing Temporary routing 26 Which routing protocol maintains a complex database of topology information a nd uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 27 Which statement is true concerning port addressing? TCP ports 0-255 are for private applications TCP ports above 1023 are for marketable applications Answer:UDP ports 0-255 are for public applications UDP ports 256-1023 are unregulated 28 Which level of Cisco IOS allows only view status? Answer:User mode Enable mode Privileged mode Global configuration mode 29 What is an example of a global parameter? IP address Network number Answer:Router host name Subnet mask 30 If a new LAN is added to an internetwork, which command would add the network to the routing table? Router (config)>ip route 2.0.0.0 255.0.0.0 via 1.0.0.2 Answer:Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Router (config)# ip route 2.0.0.0 via 1.0.0.2 Router (config)# ip route 2.0.0.0 1.0.0.2 using 255.0.0.0 31 Which command is used to configure a routing protocol? Router#rip network 192.11.10.0 Answer:Router(config)# router rip Router(config)# routing rip Router(config)# routing protocol rip 32 Which command will display statistics for all interfaces configured on the ro uter? List interfaces Answer:Show interfaces Show processes Show statistics

33 What is used by a routing protocol to determine the best path to include in t he routing table? Convergence time Default distance Answer:Metric Type of router 34 A router received a packet with a destination address of 172.16.14.228. Assum ing a subnet mask of 255.255.248.0, what is the subnet network address for the d estination host? 172.16.1.0 172.16.4.0 Answer:172.16.8.0 172.16.12.0 35 Where does a router search for an IOS image if none is found in flash? RAM ROM Answer:TFTP NVRAM 36 What is used by distance-vector routing protocols? A topological database Link-state advertisements Answer:Periodic updates of entire routing table Shortest path first algorithms 37 Which layer of the TCP/IP model corresponds to the OSI network layer? Application Answer:Internet Network Interface Transport 38 Which two layers of the OSI model are described by WAN standards? Application Layer, Physical Layer Answer:nswer:ata Link Layer, Physical Layer Data Link Layer, Transport Layer Physical Layer, Network Layer 39 From the following list, what is the correct order of data encapsulation? 1. Segments2. Bits3. Packets4. Frames Answer:1-3-4-2 2-1-3-4 2-3-4-1 3-1-2-4 40 Which condition best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork When several messages are being sent to the same destination

41 What is the result of executing the erase startup-config command? It deletes the active configuration file from RAM. Answer:It deletes the backup configuration file in NVRAM. It deletes the saved configuration file from ROM. It deletes the saved configuration file from the C:\ drive. 42 Which name is given to a group of routers under a common administration that present a consistent view of routing to the external world? Answer:nswer:utonomous system Corporate system Domain name system Interior network system 43 Which Cisco IOS command displays routing table entries? ping trace Answer:show ip route show interface 44 What is a characteristic of IGRP? It is a link state routing protocol. Routing updates are broadcast every 30 seconds. The maximum hop count is 15. Answer:The metric for path selection is a composite metric using bandwidth and delay. 45 When sending data to a host on a different network, which address does the so urce host encapsulate in the IP header? IP address of the router MAC address of the router MAC address of the destination device Answer:IP address of the destination host 46 Which command causes a router to boot from ROM? Router#boot system rom Router#boot system rom IOS_filename Answer:Router(config)# boot system rom Router(config)# boot system rom IOS_filename 47 Which metrics are commonly used by routers to evaluate a path? EMI load, SDLC connections, deterioration rate Answer:nswer:andwidth, load, reliability Distance, hub count, SN ratio Signal count, loss ratio, noise 48 Which command is used to download a new system image file from a TFTP server to a router? Copy flash tftp Copy nvramtftp Answer:nswer:opy tftp flash Copy tftpnvram

49 Which keys are pressed in the escape sequence to terminate the initial config uration while in setup mode? ESC Answer:nswer:TRL-C CTRL-ESC CTRL-SHIFT-6 , X 50 How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? 18 19 Answer:20 21 51 Which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? Layer 4 Layer 3 Answer:Layer 2 Layer 1 52 Which command is used to turn off the name-to-address translation in a router ? no ip host no ip address no ip name-search Answer:Answer:no ip domain-lookup 53 Which representations have the same meaning when representing the subnet mask ? /10 and 255.224.0.0 /15 and 255.255.0.0 Answer:/21 and 255.255.248.0 /24 and 255.255.0.0 Book3 Chapter 2 1. What will be generated when the first Ethernet station detects a collision? NACK CRC misalignment message Reset broadcast Answer:Jam signal 2. Which switch type provides connections between ports of like bandwidth? Asymmetric Port-centric Programmable Answer:Symmetric 3. Which area of memory does the switch use to store destination and transmissio n data? Storage partition Delay queue

Answer:Memory buffer Memory queue 4. Full duplex requires how many pairs of wires? 1 Answer:2 3 4 5. What is read by a switch to begin the forwarding process and reduce latency? Frame trailer Answer:Destination MAC address Source MAC address Checksum 6. Switches on a LAN allow the network administrator to do which of the followin g? Maintain a shared network segment Decrease the number of collision domains Prevent microsegmentation Answer:Increase the number of collision domains 7. What occurs each time a switch stores an address? Checks the subnet mask Answer:Time stamps it Places it in the routing table Clears the routing table 8. Which OSI layer does a router use to make its forwarding decisions? 1 2 Answer:3 4 9. The implementation of switching technology helps to decrease congestion by re ducing traffic and increasing which of the following? Attenuation Answer:Available bandwidth Routing protocols Propagation 10. How do VLANs group network devices? Physically Answer:Logically Geographically Topographically 11. What protocol is used to allow redundant paths in a switched/bridged network ? RIP Answer:Spanning Tree IGRP ISL 12. What type of switching method is used when a switch only reads the destinati on address before forwarding the frame? Answer:Cut-through Read and send Copy and send

Store-and-forward 13. A LAN switch allows many users to communicate in parallel through which of t he following? Routing tables Multipoint protocols Collision domains Answer:Virtual circuits 14. Switches that receive the entire frame before sending it, use what type of f rame forwarding? Cut-through Receive and send Copy and send Answer:Store-and-forward 15. Which Layer 1 device is used to extend the coverage area of a LAN segment? Router Switch Answer:Repeater Gateway 16. Which of the following is the default order of Spanning Tree Protocol states ? 1. Learning 2. Disabled 3. Blocking 4. Listening 5. Forwarding Answer: 3, 4, 1, 5, 2 4, 3, 1, 2, 5 2, 1, 4, 3, 5 1, 4, 3, 5, 2 17. Which of the following improves the performance of a shared media LAN? Answer:Segmenting the network Moving the workstations closer together Installing a more powerful server Installing more servers and printers 18. What is used to alleviate congestion? Install more hubs Use an extended star Use a bus topology Answer:Increase the bandwidth 19. Bridges learn about a network by building a table based on which of the foll owing? Answer:MAC addresses IP addresses ARP requests RIP requests 20. What percentage of bandwidth is available in each direction when using fullduplex? 50% 75% Answer:100% 125%

21 Which of the following does a switch use to make forwarding decisions? Network layer information Transport layer information Answer:A MAC address An IP address Chapter 3 1. Users may be reassigned to different VLANs using which of the following? Hubs Answer:Software Routers Bridges 2. Which device is used to reduce or eliminate broadcast related problems? Bridges Answer:Routers Passive hubs Active hubs 3. According to the IEEE, what is the acceptable way to implement VLANs? Grouping Filtering Source bridging Answer:Frame tagging 4. A VLAN makes up a switched network that is logically segmented by all of the following EXCEPT: Answer:Collison domains Functions Applications Project teams 5. What is the term used when switch ports are automatically assigned to a VLAN? Answer:Dynamic Static Port-centric Default 6. What is a VLAN used to create? Autonomous systems Answer:Broadcast domains Network Sectors Virtual sections 7. What is an effective preventative measure used with segmentation to prevent b roadcast related problems? Answer:Firewalls LANs WANs Bridges 8. What would be the preferred type of link of a VLAN backbone? slow serial low capacity 56 Kbps Answer:High bandwidth

9. What is the term used when ports on a switch are administratively assigned to a VLAN? Answer:Dynamic Static Default Polled 10. A VLAN is based on which type of grouping? Answer:Logical Physical Star Ethernet 11. How can access be controlled on a secured VLAN? Station address Protocol types Application types Answer:All of the above 12. Which technique examines particular information about each frame? Latency Frame resolving Answer:Frame filtering Store and forward 13. Dynamic VLANs can be based on which of the following? MAC addresses Protocol type Logical addressing Answer:All of the above 14. Frame tagging functions at what OSI layer? Answer:2 3 1 4 15. Which of the following do VLANs use to make filtering and forwarding decisio ns? Packets Answer:Frames Presentation header Network design 16. The smaller the VLAN, the smaller the number of users that are affected by w hich of the following? Packet filtering Switch latency Framing Answer:Broadcasts 17. What technique does 802.1q use to implement VLANs? Grouping Filtering Source bridging Answer:Frame tagging 18. What is a benefit of using VLANs? Extended collision domains Increased administration

Multiple cable runs Answer:Tighter network security 19. When logically segmenting your network with VLANs, what type of device do yo u need to ensure proper communication between the VLANs that are created? Switch Bridge Hub Answer:Router 20. Which of the following VLAN types require changes by the network administrat or but are easy to configure, and straightforward to monitor? Dynamic Answer:Static Cut-through Store-and-forward 21. Frame tagging places a unique identifier in the header of each frame as it i s forwarded across the network __________. microsegment LAN Answer:backbone WAN Chapter 4 1. Which of the following results in network microsegmentation? Using only hubs for connectivity Removing bridges from the network Answer:Using switches for connectivity Adding more computers on a single segment 2. Which of the following devices establishes a bandwidth domain also known as t he collision domain? Repeater Answer:Switch Active hub Passive hub 3. The star/extended star topology uses what type of standard? Token ring Answer:Ethernet 802.3 Ethernet 802.5 ARCNET 4. What is the ability to expand the network without having to perform any major changes to the overall design? Functionality Manageability Operability Answer:Scalability 5. Which of the following is NOT a factor when configuring an intranet? Type of data to be accessed Server privileges Answer:Providing public access Outfitting desktops with faster connectivity 6. Where should workgroup servers be placed? MDF

POP VCC Answer:IDF 7. Internetwork design seeks to provide the greatest availability for the least _________. design time Answer:cost network downtime installation time 8. Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer:Develop LAN topology Track information flow List applications in use Address performance issues 9. Which of the following is NOT true about logical and physical network maps? Give a snapshot of the network Help troubleshoot Answer:Show which routing protocol is used Show subnet mask and router name 10. Which device is one of the most common Layer 2 devices? Answer:LAN switch Active hub Passive hub Router 11. Which of the following results from the use of bridges and switches for segm entation? Multiple broadcast domains A single collision domain A larger overall network Answer:Multiple collision domains 12. What is the most important Layer 1 issue to consider when designing a networ k? VLAN layout Answer:Physical cable plan Router layout Switch segmentation 13. What is the current standard for the bandwidth connecting MDF to IDF in Mbps ? 1 10 Answer:100 150 14. What is the first step in LAN design? Answer:Establish the design goals Estimate the design cost Determine the network users Determine the physical size 15. In a pure LAN switch environment, what is the size of the collision domain? All hosts Four hosts

Answer:Two hosts The number of hosts in the broadcast domain 16. What can routers provide when used between VLANs? Answer:Communication No services Larger collision domains Additional availability of MAC addresses 17. Which of the following is allowed by asymmetric switching? Shared switching on a segment Answer:Connections of unlike bandwidth Dedicated uplink connectivity Like bandwidth connections 18. What do VLANs provide? Physical networks Larger broadcast domains Decreased security Answer:Broadcast containment 19. Which of the following devices is associated with one broadcast domain per p ort? Switch Active hub Answer:Router Bridge 20. What type of network segmentation do routers allow? Logical and Incremental Answer:Logical and Physical Virtual and Physical Virtual and Logical 21. When creating multiple wiring closets in a totally switched environment, wha t else is always created? Answer:Multiple catchment areas Multiple broadcast domains Multiple MDFs Multiple LANs 22. What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? 3 m Answer:6 m 9 m 10 m 23. What is the effect of a switch on bandwidth? Answer:Dedicates bandwidth Shares bandwidth Decreases bandwidth Eliminates bandwidth 24. What is used to create multiple physical networks in a structured Layer 1 wi ring scheme? Answer:Patching the horizontal and vertical cabling into an appropiate layer 2 switch Using a router Connecting the MDF to the IDF

Patching fiber optic cable to coaxial cable Chapter 5 1.Which OSI layer is responsible for finding the best path through the internetw ork? 1 2 Answer:3 4 2.What is a router's main responsibility when routing packets? Traffic control Collision avoidance Enforcing security Answer:Path determination 3.What do routers use to make forwarding decisions? Answer:Routing tables VLANs WAN connectivity Proximity 4. Which of the following refers to the number of routers a packet must pass thr ough? Bandwidth Answer:Hop count Tick count Delay 5. What two parts can most protocol addressing schemes be broken down into? TCP and IP IPX and SPX Network and broadcast Answer:Network and host 6.What allows a router to accept a packet on one interface and forward it to ano ther interface? Broadcast forwarding Answer:Switching function Filter and control function Path determination 7. What do routers use to communicate with other routers? Broadcast forwarding IP Tunneling Answer:Routing protocols Routed protocols 8. Entries made by an administrator to manipulate a routing table are referred t o as which of the following? Answer:Static routes Dynamic routes ARP tables

Routing tables 9. Distance-vector routing begins by identifying which directly connected entity ? Routers Ports Switches Answer:Networks 10. Which routing protocol is used to communicate between autonomous systems? RIP Ethernet Token Ring Answer:Exterior routing protocols 11. 1. 2. 3. 4. 5. Which of the following are primary goals of routing protocols? Point-to-multipoint routing Rapid convergence Efficiency Flexibility Microsegmentation

1, 2, 3 Answer:2, 3, 4 3, 4, 5 1, 3, 5 12. What causes routing loops? Path determination is optimized Hop count is set below 50 Convergence is present Answer:Routing tables have not converged 13. What type of information is automatically adjusted as topology changes occur ? Static routes Answer: Dynamic routes ARP tables RARP tables 14. What does dynamic routing rely on? Maintenance of an ARP table Accurate entry of static routes Answer:Accurate routing tables Collision forwarding 15. For dynamic routing to work properly what must routers send to other routers ? ARP requests RARP packets Static routes Answer:Timely updates

16. Which of the following is another term for shortest path first routing algor ithm? Source bridging Store-and-forward Distance-vector Answer:Link state 17. Which of the options below gives two basic steps required when configuring a routing protocol? 1. Configure the interface 2. Enable the routing protocol 3. Disable routing updates 4. Add the network numbers 1, 2 2, 3 Answer:2, 4 3, 4 18 . What passes periodic copies of routing tables from router to router? Link state Answer:Distance vector Store-and-forward Cut-through 19. Which of the following is a Cisco proprietary protocol? Answer:IGRP RIP OSPF ISIS 20. Routers under a common administration are said to belong to what? A WAN A LAN Answer:An AS An SNMP 21. Select the correct IOS command for configuring IGRP as the routing protocol. RouterAnswer:routerigrp 100 Router(config-router)>router igrp 100 Answer:Router(config)Answer:router igrp 100 Router(config-if)Answer:set router igrp 100 22.At what time interval does IGRP send routing updates? 120 seconds 30 seconds 60 seconds Answer:90 seconds 23. What is the maximum hop count associated with IGRP? 15 50 100

Answer:255 Chapter 6: ACLs 1. Which of the following must be configured on a router in order to deny packet s based on specific tests? Answer:Access lists RIP IGRP Source routing 2. When using a standard access list, which of the following criteria can router s use for filtering packets? MAC address Port numbers Specific protocols Answer:Source address 3. Which type of access list uses the number range 100-199? IPX standard AppleTalk IP standard Answer:IP extended 4. A wildcard mask bit of "1" means that the corresponding bit must be _________ __. checked Answer:ignored deleted passed 5. Which order are the statements in an access list processed to determine wheth er packets should be processed or discarded? From bottom of the list up In random order By prioritizing the incoming packets Answer:In sequential order 6. What happens to a packet that does not match any of the tests in an access li st? Answer:It is discarded. It is sent to the recipient. It is stored until the access list is updated. It is returned to the sender. 7. What is the final step in implementing an access list? Answer:Apply the access list to one or more interfaces. Set the parameters for the access list tests. Determine the state of the access list. None of the above 8. What type of access list would you use to permit or deny specific protocols w

ithin the IP suite? Answer:Extended Protocol suite Specific Standard 9. IP access lists use which of the following to determine which address bits ar e examined? Subnet masks Network masks Host IDs Answer:Wildcard bits 10. Which wildcard mask would match the host range for the subnet 192.16.5.32 /2 7? 0.0.0.32 0.0.0.63 0.0.63.255 Answer:0.0.0.31 11. What would the wildcard mask be to deny traffic only on network 195.67.52.0? 0.0.255.255 255.255.255.0 Answer:0.0.0.255 255.255.0.0 12. In an access list, what word can replace 0.0.0.0 255.255.255.255? Permit Accept Answer:Any All 13. Which type of access list would permit or deny part of a protocol suite? Standard General Specific Answer:Extended 14. Which command is used to keep track of how many packets were permitted or de nied based on an access-list? eq establish ack Answer:log 15. Along with the packet type, Cisco IOS access lists also check what? Physical layer headers Answer:Upper layer headers Lower layer headers Data link headers 16. What is a possible use of ACLs? Increased network traffic

Decreased security Answer:Packet filtering Decreased latency 17. Which port number is used for DNS? 21 33 52 Answer:53 18. Which ACL would permit everyone to telnet to router 192.168.5.2? router-a(config)Answer:access-list 102 permit ip any host 192.168.5.2 eq 23 router-aAnswer:access-list 102 permit ip any host 192.168.5.2 eq 23 Answer:router-a(config)Answer:access-list 102 permit tcp any host 192.168.5.2 e q 23 router-aAnswer:access-list 102 permit tcp any host 192.168.5.2 eq 23 19. Where should standard access lists be set? Close to the source Answer:Close to the destination On any router in the network Midway between source and destination 20. Access lists can be applied to traffic flowing in which direction? Inbound only Answer:Both inbound and outbound Outbound only Serial only 21. Which Cisco IOS command allows you to view the placement of an access list? show access list show access-group Answer:show ip interface show interface Chapter 7: Novell IPX 1. How do you obtain an IPX network address? Apply to InterNIC Use DHCP Add the address with the subnet mask Answer:Obtain it from the network administrator 2. Which frame types are compatible with the Cisco IOS name Novell-ether? Ethernet_II Ethernet_802.2 Ethernet_SNAP Answer:Ethernet_802.3 3. Which command is used to display IPX routing tables? show ipx servers Answer:show ipx route

show ipx traffic show ipx interface 4. When using multiple encapsulations on an interface, what must be assigned? Multiple protocols Answer:Multiple network numbers Multiple subnet masks Multiple SAP types 5. Which of the following commands enables IPX routing? ipx maximum-paths Answer:ipx routing ipx network router novell-rip 6. What is the encapsulation type on a router for a Novell network running versi on 3.12? Novell-ether ARPA SNAP Answer:SAP 7. What do NetWare clients use to find NetWare servers? GNS packets Answer:SAP packets RIP packets SPX packets 8. What do routers do with SAP packets? Answer:Build a SAP table Discard the SAP packets Forward the SAP packets Send them to a SAP server 9. Where does the response to a GNS request come from if there is both a Cisco r outer and a NetWare server on the same LAN? Router Answer:Local NetWare server Local SAP server Switch 10. When configuring interfaces for IPX, what must be assigned to each interface ? IP address Host address Answer:Network number Subnet mask 11. What is the default WAN tick metric for IPX networks? Five Answer:Six Seven Eight

12. Which Cisco IOS command is used to check IPXSAP updates? show sap routing updates show sap routing activity Answer:debug ipx sap activity debug sap routing activity 13. Which configuration command is used to set the number of routes used for loa d sharing? ipx routing ipx networks Answer:ipx maximum-paths router rip 14. Where are SAP tables stored? On workstations and servers Answer:On routers and servers On routers and workstations On routers only 15. What type of protocol is IPX? Connection-oriented Answer:Connectionless Nonroutable Connection like 16. Why would you use the command IPX maximum-paths? To define the maximum hops To specify the number of routes available Answer:To provide load sharing To increase the tick count 17. What does IPX use in the host portion of an address to eliminate the use of ARP requests? SAP SPX Answer:MAC RARPs 18. What is correct regarding the node number using Novell's IPX addressing sche me? 80 bits long Written in decimal Answer:Same as the MAC address Number assigned by an administrator 19. Select the command that you would use to check IPX routing updates. show ipx routing updates show ipx routing activity Answer:debug ipx routing activity debug ipx rip 20. Which of the following occurs when a router running Novell RIP has two equal paths to a network?

Selects the route with the lowest hop count. Discards the packet. Forwards the packet out the default route. Answer:Implements load sharing. 21. Which metrics does Novell RIP use? Bandwidth and delay Answer:Ticks and hop count Distance and cost Size and throughput 22. What is the default type of routing protocol used by Novell NetWare? Link-state Answer:Distance vector Hybrid OSPF 23. Which IPX routing command is used to show the number and type of packets rec eived and transmitted by the router? show ipx servers show ipx route Answer:show ipx traffic show ipx interface Chapter 8: Network management 1. A peer-to-peer network is also known as what type of network? Client-server Thin client Answer:Workgroup Home office 2. Which of the following redundancy techniques uses disk striping with parity a nd requires a minimum of three disks? RAID 0 RAID 1 RAID 4 Answer:RAID 5 3. Which of the following would NOT be found on security documentation? User rights Firewall support Answer:Software listings Physical access to the network 4. Which command will test the loopback function on the NIC? Answer:Ping 127.0.0.1 Telnet 127.0.0.1 Ping 127.0.0.0 Telnet 127.0.0.0 5. Which device controls voltage spikes and HF noise? Surge Suppressor Answer:Isolating transformer Regulator Wall outlet

6. Which of the following is NOT associated with a peer-to-peer network? Easily shared resources No additional software is required Requires a dedicated server Less expensive to create 7. Which of the following is used to keep a list of equipment repairs? Security record Software record Answer:Maintenance record Policy record 8. Which of the following reports would be used to determine what programs are i nstalled on a particular computer? Answer:Software Server Network Workstation 9. Which of the following is the most critical component of good network adminis tration? Security Performance Answer:Documentation Backbone 10. What is the least implemented component of network administration? Security Performance Answer:Documentation Baselining 11. What is a solution to the problem of EMI/RFI effecting performance on your n etwork? Running cable along power lines Answer:Using STP cable Using fluorescent lighting Use generators to power switches in MDF 12. What is the reason magnetic tape is used to backup data? Speed Easily locate data Answer:Cost Tape never needs replacing 13. Which of the following is a program that spreads across computers and usuall y reproduces copies of itself in a computer's memory? CRC error SAP updates Answer:Worm BDU's 14. Which of the following is NOT used as a baseline measure? Bandwidth utilization Collision count Broadcast traffic Answer:Configuration errors 15. Network troubleshooting is defined as what type of process?

An applied science Answer:A systematic process A skill An applied theory

16. Which of the following is a program that usually has a negative effect on ex ecutable programs? Trojan Horse Answer:Virus Worm Infection 17. What criteria should be used to select network passwords? Specific family names Birth dates Mother's maiden name Answer:Network policy 18. What controls the resources and management of a client-server network? Server Answer:Network operating system (NOS) Host Client 19. Which of the following is included in MDF and IDF documentation? POP specifications Answer:Rack mount locations Name of administrator Server cost 20. Which of the following refers to documentation that outlines what is and wha t is not permissible on the network? Answer:User policies Internet guidelines Group restrictions Workstation permissions 21. Risks associated with working on the inside of a computer can be reduced by doing which of the following? Answer:Using a grounding strap Standing on synthetic carpet Turning the power on Wearing leather shoes 22. What is the recommended maximum number of users in a peer-to-peer network? 5 Answer:10 15 20 Mixed Final Exam of the book 3 1. How is communication provided between VLANs? Application protocols Layer 2 routing Layer 2 switching Answer:Layer 3 routing

2. The star/extended star topology uses which standard? Token ring Answer:Ethernet 802.3 Ethernet 802.5 ARCNET 3. Which configuration command is used to set the number of routes used for load sharing? ipx routing ipx networks Answer:ipx maximum-paths router rip 4. Which type of back up operation backs up all files on the disk and sets the a rchive bit on all files to off? Daily backup Differential backup Answer:Full backup Incremental backup 5. What happens to a packet that does not match any of the tests in an access li st? Answer:It is discarded. It is sent to the recipient. It is stored until the access list is updated. It is returned to the sender. 6. A wildcard mask bit of "0" means that the corresponding bit must be _________ . Answer:matched ignored deleted passed 7. Select the correct pairing of a Spanning Tree Protocol state with its functio nal description: Blocking - no frames forwarded, learning addresses Forwarding - no frames forwarded, BPDUs heard Learning - no frames forwarded, no BPDUs heard Answer:Listening - no frames forwarded, listening for frames 8. Which routing protocol maintains a complex database of topology information a nd uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 9. How can a router learn a path to a destination? ARP tables DNS entries

Answer:Dynamic routing Temporary routing 10. In an access list, which word can replace 0.0.0.0 255.255.255.255? Permit Accept Answer:Any All 11. What is used by distance-vector routing protocols? A topological database Link-state advertisements Answer:Periodic updates of entire routing table Shortest path first algorithms 12. What do routers use to forward packets between source and destination networ ks? ARP cache CAM table Host name table Answer:Routing table 13. What do routers use to maintain tables? Broadcast forwarding IP Tunneling Routed protocols Answer:Routing protocols 14. Which statements are true when configuring a router to operate with RIP? At the global configuration prompt issue the command "router rip." Then set up t he IP address and subnet mask on each interface. Answer:At the global configuration prompt issue the command "router rip." Then i ssue the "network" command at the config router prompt for each directly connect ed network. At the global configuration prompt issue the command "rip." Then use the "networ k" command to indicate which network(s) to advertise. At the global configuration prompt issue the command "enable rip routing." Then set up the IP address and subnet mask on each interface. 15. Select the prompt which will be displayed after issuing the router igrp 100 command. RouterAnswer: Answer:Router(config)Answer: Router(config-igrp)Answer: Router(config-router)Answer: 16. Switches that receive the entire frame before sending it, use which type of frame forwarding? Cut-through Receive and send Copy and send Answer:Store-and-forward

17. Which frame type is the default for Novell version 2 through 3.11? Ethernet_802.2 Answer:Ethernet_802.3 Ethernet_II Ethernet_SNAP 18. Which type of ACL only checks the source address? Extended ACL General ACL Source ACL Answer:Standard ACL 19. Which of the following imposes boundaries on broadcast traffic? Bridge Repeater Answer:Router Transceiver 20. Which IPX routing command is used to show the number and type of packets rec eived and transmitted by the router? show ipx servers show ipx route Answer:show ipx traffic show ipx interface 21. What allows a router to accept a packet on one interface and forward it to a nother interface? Broadcast forwarding Answer:Switching function Filter and control function Path determination 22. All of the following statements about VLANs are true EXCEPT: They are logical groupings of devices. Users can be grouped by function. VLANs are configured by software. Answer:VLANs are standardized. 23. Which of the following devices establishes a bandwidth domain also known as the collision domain? Repeater Answer:Switch Active hub Passive hub 24. At which layers of the OSI model do VLANs operate? Application and Presentation Answer:Data Link and Network Physical and Transport Physical and Data Link

25. Where should ACLs be applied if they are intended to provide security for th e network? Answer:On border routers On external routers On internal routers On output routers 26. In which type of VLAN are all of the nodes connected to ports in the same VL AN assigned the same VLAN ID? Default Dynamic Answer:Port centric Static 27. How is a frame tagged on a VLAN? With an application ID With a MAC address With a port ID Answer:With a VLAN ID 28. What is another term for latency? Backoff algorithm Hold-down timer Answer:Propagation delay Redundancy 29. What does the split horizon rule help prevent? Static routes Answer:Routing loops Dynamic routes Large ARP tables 30. Before a router forwards a packet, which address does it change? Destination IP address Answer:Destination MAC address Next-hop IP address Source IP address 31. What is a benefit of using VLANs? Extended collision domains Increased administration Multiple cable runs Answer:Tighter network security 32. A switch segments a LAN into which of the following? Answer:Microsegments Workgroups Broadcast domains Access groups 33. Twenty users are evenly connected to two hubs, which are each connected to 1 0 Mbps switch ports. What is the average bandwidth available per user?

0.5 Mbps Answer:1 Mbps 2 Mbps 10 Mbps 34. Which of the following is the correct command to delete an access list? Router(config)# delete access list list-number Answer:Router(config)# no access-list list-number Router(config-if)# delete access-list list-number Router(config-if)# no access list list-number 35. Which of the following is true regarding routing metrics? All routing protocols use the same metrics. IGRP uses bandwidth as its only metric. Answer:Routers compare metrics to determine the best route. The larger metric generally represents the better path. 36. What is the recommended maximum number of users in a peer-to-peer network? 5 Answer:10 15 20 37. Which protocol is used to allow redundant paths in a switched/bridged networ k? RIP Answer:Spanning Tree IGRP ISL 38. What is the effect of a switch on bandwidth? Answer:Dedicates bandwidth Shares bandwidth Decreases bandwidth Eliminates bandwidth 39. What is the encapsulation type on a router for a Novell network running vers ion 3.12? Novell-ether ARPA SNAP Answer:SAP 40. Identify the correct pairing of a protocol and its classification. BGP-Interior IGRP-Exterior OSPF-Exterior Answer:RIP-Interior 41. Which of the following is a true statement regarding location of servers in a network? Enterprise and workgroup servers should both be in the IDF. Enterprise and workgroup servers should both be in the MDF.

Answer:Workgroup servers should be in the appropriate IDF, while enterprise serv ers should be in the MDF. Workgroup servers should be in the appropriate MDF, while enterprise servers sho uld be in the IDF. 42. Which device is one of the most common Layer 2 devices? Answer:LAN switch Active hub Passive hub Router 43. Which of the following RAID levels includes disk mirroring or disk duplexing ? RAID 0 Answer:RAID 1 RAID 3 RAID 5 44. Select the correct pairing of a network service with the class of server on which it is most likely to reside: Answer:DNS - enterprise E-mail - workgroup File sharing - enterprise Word processing - enterprise 45. Which of the following devices allows communication between VLANs to occur? bridge hub switch Answer:router 46. Which of the following will help alleviate congestion? The installation of more hubs The use of an extended star topology The use of bus topology Answer:An increase in bandwidth 47. Which condition best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struct ure and topology of the internetwork When several messages are being sent to the same destination 48. Entries made by an administrator to manipulate a routing table are referred to as which of the following? Answer:Static routes Dynamic routes ARP tables Routing tables 49. What does a bridge use to build its address table?

Destination IP address Destination MAC address Source IP address Answer:Source MAC address 50. Which of the following is true regarding latency? CSMA/CD requires no latency. It is also called asymmetry. It is based entirely on distance. Answer:Networking devices add to latency. 51. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps wo uld require which of the following? Answer:A faster switch port A new HCC port Additional VCC uplink connections Use of fiber-optic media 52. Which routing protocol is used to communicate between autonomous systems? RIP Ethernet Token Ring Answer:Exterior routing protocol 53. Where should extended access lists be placed? Answer:Close to the source Close to the destination On any router in the network Midway between source and destination 54. Which command verifies that a particular node is capable of responding to an IPX network request? Connect Debug Answer:Ping Show Chapter 5 62. When the destination network is not listed in the routing table of a Cisco r outer, what are two possible actions that the router might take? (Choose two.) answer: The router discards the packet.;The router forwards the packet out the i nterface indicated by the default route entry.//The router sends an ARP request to determine the required next hop address. 63. What are the key factors to consider when grouping hosts into a common netwo rk? (Choose three.) gateways answer:purpose;geographic location;ownership 64. the the the What is a component of a routing table entry? MAC address of the interface of the router destination Layer 4 port number destination host address

answer: the next-hop address 65. Which three statements are true about routes and their use? (Choose three.) If no route to the destination network is found, the packet is returned to the p revious router. answer: If the destination network is directly connected, the router forwards th e packet to the destination host.;If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router. ;If the originating host has a default gateway configured, the packet for a remo te network can be forwarded using that route. If a host does not have a route manually configured for the destination network, the host will drop the packet. 66. Refer to the exhibit. A network administrator notices that there are too man y broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two.) answer:Replace S2 with a router.;Subnet the 192.168.0.0 /24 network. Disable all unused interfaces on the switches. 67. What two characteristics are commonly associated with dynamic routing protoc ols? (Choose two.) require no device configuration answer:provide routers with up-to-date routing tables;consume bandwidth to excha nge route information prevent manual configuration and maintenance of the routing table 13 68. What statement describes the purpose of a default route? A host uses a default route to transfer data to another host on the same network segment. A host uses a default route to forward data to the local switch as the next hop to all destinations. A host uses a default route to identify the Layer 2 address of an end device on the local network. answer: A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists. 69. What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number answer: source and destination IP address 70. In a connectionless system, which of the following is correct? The destination is contacted before a packet is sent. answer: The destination is not contacted before a packet is sent. The destination sends an acknowledgement to the source that indicates the packet was received. The destination sends an acknowledgement to the source that requests the next pa cket to be sent. 71. Which IP packet field will prevent endless loops? type-of-service identification flags answer: time-to-live header checksum 72. What type of routing uses information that is manually entered into the rout ing table? dynamic interior answer: static standard

73. What are three common problems with a large network? (Choose three.) too few broadcasts answer: performance degradation;security issues;host identification protocol compatibility 74. Which intermediary devices could be used to implement security between netwo rks? (Choose two.) answer:router;firewall access point bridge 75. In an IPv4 environment, what information is used by the router to forward da ta packets from one interface of a router to another? answer: destination network address source network address source MAC address well known port destination address 14 76. Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the topology that is shown? answer:4 77. Which portion of the network layer address does a router use to forward pack ets? host portion broadcast address answer: network portion gateway address 78. What is the purpose of a default gateway? physically connects a computer to a network provides a permanent address to a computer identifies the network to which a computer is connected identifies the logical address of a networked computer and uniquely identifies i t to the rest of the network answer: identifies the device that allows local network computers to communicate with devices on other networks 79. If the default gateway is configured incorrectly on the host, what is the im pact on communications? The host is unable to communicate on the local network. answer: The host can communicate with other hosts on the local network, but is u nable to communicate with hosts on remote networks. The host can communicate with other hosts on remote networks, but is unable to c ommunicate with hosts on the local network. There is no impact on communications. 15 80. Refer to the exhibit. A network administrator is troubleshooting a connectiv ity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the admin istrator would identify which address as the address to which all hosts send packets that are destined for an outside network? 10.10.10.26 127.0.0.1 answer: 10.10.10.6 10.10.10.1 224.0.0.0 81. Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology

that is shown? (Choose two.) answer:192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network.;192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network. 192.168.0.2 is the next-hop address that is used by R2 to route a packet from th e 172.16.0.0 network to the 192.168.12.0 network. 16 82. Refer to the exhibit. Using the network in the exhibit, what would be the de fault gateway address for host A in the 192.133.219.0 network?192.135.250.1 192.31.7.1 192.133.219.0 answer: 192.133.219.1 17 Chapter 6 83. Which IPv4 subnetted addresses represent valid host addresses? (Choose three .) 172.16.4.127 /26 answer:172.16.4.155 /26;72.16.4.193 /26;172.16.4.207 /27 84. What subnet mask would a network administrator assign to a network address o f 172.30.1.0 if it were possible to have up to 254 hosts? 255.255.0.0 answer: 255.255.255.0 255.255.254.0 255.255.248.0 85. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong? 172.16.0.0 172.16.192.0 172.16.192.128 answer: 172.16.192.160 172.16.192.168 172.16.192.176 86. What is the primary reason for development of IPv6? security header format simplification answer: expanded addressing capabilities addressing simplification 87. What is the network address of the host 172.25.67.99 /23 in binary? 10101100. 00011001.01000011.00000000 10101100. 00011001.01000011.11111111 answer: 10101100. 00011001.01000010.00000000 10101100. 00011001.01000010.01100011 10101100. 00010001.01000011. 01100010 10101 100. 00011001.00000000.00000000 88. What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.) answer:1 The router will discard the packet.;3 The router will send a time excee ded message to the source host. 4 The router will increment the TTL value and forward the packet to the next rou ter on the path to the destination host. 5 The router will send an ICMP Redirect Message to the source host. 89. Which three IP addresses are private? (Choose three.) 1 172.168.33.1

answer:2 10.35.66.70;3 192.168.99.5;4 172.18.88.90 5 192.33.55.89 6 172.35.16.5 90. Which process do routers use to determine the subnet network address based u pon a given IP address and subnet mask? 1 binary adding 2 hexadecimal anding 3 binary division 4 binary multiplication answer: 5 binary ANDing 18 91. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address? 1 This is a useable host address. 2 This is a broadcast address. answer: 3 This is a network address. 4 This is not a valid address. 92. Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic. 1 /24 2 /16 3 /20 answer: 4 /27 5 /25 6 /28 93. Refer to the exhibit. Why would the response shown be displayed after issuin g the command ping 127.0.0.1 on a PC? 1 The IP settings are not properly configured on the host. answer: 2 Internet Protocol is not properly installed on the host. 3 There is a problem at the physical or data link layer. 4 The default gateway device is not operating. 5 A router on the path to the destination host has gone down. 94. What is a group of hosts called that have identical bit patterns in the high order bits of their addresses? 1 an internet answer: 2 a network 3 an octet 4 a radix 19 95. Refer to the exhibit. The network administrator has assigned the internetwor k of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new buildin g, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company polici es, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which co nfiguration should be entered into the workgroup server's properties to allow connectivity to the network? 1 IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.16 8.10.39 2 IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.16 8.10.33 answer: 3 IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway : 192.168.10.33

4 IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway: 192.16 8.10.31 5 IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway: 192.168 .10.1 96. Refer to the exhibit. A network administrator has to develop an IP addressin g scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks? 1 255.255.255.248 2 255.255.255.224 answer: 3 255.255.255.192 4 255.255.255.240 5 255.255.255.128 6 255.255.255.252 97. What three facts are true about the network portion of an IPv4 address? (Cho ose three.) 1 identifies an individual device answer:2 is identical for all hosts in a broadcast domain;4 varies in length;5 i s used to forward packets 6 uses flat addressing 98. Which statements are true regarding IP addressing? (Choose two.) 1 NAT translates public addresses to private addresses destined for the Internet . 2 Only one company is allowed to use a specific private network address space. answer:3 Private addresses are blocked from public Internet by router.;5 IP addr ess 127.0.0.1 can be used for a host to direct traffic to itself. 20 99. Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.) 1 LAN workstations answer:2 servers;3 network printers;4 routers 5 remote workstations 6 laptops 100. Refer to the exhibit. A network administrator discovers that host A is havi ng trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem? 1 The router has an incorrect gateway. 2 Host A has an overlapping network address. 3 Host A has an incorrect default gateway configured. 4 Host A has an incorrect subnet mask. answer:5 NAT is required for the host A network. 101. Which of the following are features of IPv6? (Choose three.) answer:1 larger address space;3 data types and classes of service;4 authenticati on and encryption 5 improved host naming conventions 6 same addressing scheme as IPv4 102. Refer to the exhibit. Host A is connected to the LAN, but it cannot get acc ess to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem? 1 The host subnet mask is incorrect. 2 The default gateway is a network address. 3 The default gateway is a broadcast address. answer: 4 The default gateway is on a different subnet from the host. 21

103. How many bits make up an IPv4 address? 1 128 2 64 3 48 answer: 4 32 22 Chapter 7 104. What is true concerning physical and logical topologies? The logical topology is always the same as the physical topology. Physical topologies are concerned with how a network transfers frames. Physical signal paths are defined by Data Link layer protocols. Logical topologies consist of virtual connections between nodes. 105. What determines the method of media access control? (Choose two.) network layer addressing media sharing application processes logical topology intermediary device function 106. Which statements describe the logical token-passing topology? (Choose two.) Network usage is on a first come, first serve basis. Computers are allowed to transmit data only when they possess a token. Data from a host is received by all other hosts. Electronic tokens are passed sequentially to each other. Token passing networks have problems with high collision rates. 107. Refer to the exhibit. Which statement describes the media access control me thods that are used by the networks in the exhibit? All three networks use CSMA/CA None of the networks require media access control. Network 1 uses CSMA/CD and Network 3 uses CSMA/CA. Network 1 uses CSMA/CA and Network 2 uses CSMA/CD. Network 2 uses CSMA/CA and Network 3 uses CSMA/CD. 108. What is true regarding media access control? (Choose three.) Ethernet utilizes CSMA/CD defined as placement of data frames on the media contention-based access is also known as deterministic 802.11 utilizes CSMA/CD Data Link layer protocols define the rules for access to different media controlled access contains data collisions 109. Which options are properties of contention-based media access for a shared media? (Choose three.) non-deterministic less overhead one station transmits at a time collisions exist devices must wait their turn token passing 23 110. What is a function of the data link layer? provides the formatting of data provides end-to-end delivery of data between hosts provides delivery of data between two applications provides for the exchange data over a common local media 111. What statements are true regarding addresses found at each layer of the OSI model? (Choose two.) Layer 2 may identify devices by a physical address burned into the network card Layer 2 identifies the applications that are communicating

Layer 3 represents a hierarchical addressing scheme Layer 4 directs communication to the proper destination network Layer 4 addresses are used by intermediary devices to forward data 112. Refer to the exhibit. A frame is being sent from the PC to the laptop. Whic h source MAC and IP addresses will be included in the frame as it leaves RouterB? (Choose two.) source MAC - PC source MAC - S0/0 on RouterA source MAC - Fa0/1 on RouterB source IP - PC source IP - S0/0 on RouterA source IP - Fa0/1 of RouterB 113. What is the purpose of the preamble in an Ethernet frame? is used as a pad for data identifies the source address identifies the destination address marks the end of timing information is used for timing synchronization with alternating patterns of ones and zeros 114. What is the primary purpose of the trailer in a data link layer frame? define the logical topology provide media access control support frame error detection carry routing information for the frame 115. What is a characteristic of a logical point-to-point topology? The nodes are physically connected. The physical arrangement of the nodes is restricted. The media access control protocol can be very simple. The data link layer protocol used over the link requires a large frame header. 24 116. Refer to the exhibit. How many unique CRC calculations will take place as t raffic routes from the PC to the laptop? 1248 117. Which sublayer of the data link layer prepares a signal to be transmitted a t the physical layer? LLC MAC HDLC NIC 118. Refer to the exhibit. Assuming that the network in the exhibit is converged meaning the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for www.server? 00-1c-41-ab-c0-00 00-0c-85-cf-65-c0 00-0c-85-cf-65-c1 00-12-3f-32-05-af 119. What two facts are true when a device is moved from one network or subnet t o another? (Choose two.) The Layer 2 address must be reassigned. The default gateway address should not be changed. The device will still operate at the same Layer 2 address. Applications and services will need additional port numbers assigned. The Layer 3 address must be reassigned to allow communications to the new networ k. 120. A network administrator has been asked to provide a graphic representation

of exactly where the company network wiring and equipment are located in the building. What is this type of drawing? logical topology physical topology cable path wiring grid access topology 25 121. What is a primary purpose of encapsulating packets into frames? provide routes across the internetwork format the data for presentation to the user answer: facilitate the entry and exit of data on media identify the services to which transported data is associated 122. What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.) answer: They are 48 binary bits in length.;They are considered physical addresse s.;They are generally represented in hexadecimal format. They consist of four eight-bit octets of binary numbers. They are used to determine the data path through the network. They must be changed when an Ethernet device is added or moved within the networ k. 123. Which three factors should be considered when implementing a Layer 2 protoc ol in a network? (Choose three.) the Layer 3 protocol selected answer: the geographic scope of the network;the physical layer implementation;th e number of hosts to be interconnected 26 Chapter 8 124. An installed fiber run can be checked for faults, integrity, and the perfor mance of the media by using what device? light injector OTDR TDR Multimeter 125. Which characteristics describe fiber optic cable? (Choose two.) It is not affected by EMI or RFI. Each pair of cables is wrapped in metallic foil. It combines the technique of cancellation, shielding and twisting to protect dat a. It has a maximum speed of 100 Mbps. It is the most expensive type of LAN cabling. 126. Which of the following is a characteristic of single-mode fiber-optic cable ? generally uses LEDs as the light source relatively larger core with multiple light paths less expensive than multimode generally uses lasers as the light source 127. What is a possible effect of improperly applying a connector to a network c able? Data will be forwarded to the wrong node. Data transmitted through that cable may experience signal loss. An improper signaling method will be implemented for data transmitted on that ca ble. The encoding method for data sent on that cable will change to compensate for th

e improper connection. 128. With the use of unshielded twisted-pair copper wire in a network, what caus es crosstalk within the cable pairs? the magnetic field around the adjacent pairs of wire the use of braided wire to shield the adjacent wire pairs the reflection of the electrical wave back from the far end of the cable the collision caused by two nodes trying to use the media simultaneously 129. What characteristic of UTP cable helps reduce the effects of interference? the metal braiding in the shielding the reflective cladding around core the twisting of the wires in the cable the insulating material in the outer jacket 130. In LAN installations where potential electrical hazards or electromagnetic interference may be present, what type of media is recommended for backbone cabling? coax fiber Cat5e UTP Cat6 UTP STP 131. Which method of signal transmission uses radio waves to carry signals? electrical optical wireless acoustic 132. What are three measures of data transfer? (Choose three.) goodput frequency amplitude throughput crosstalk bandwidth 27 133. Which type of cable run is most often associated with fiber-optic cable? backbone cable horizontal cable patch cable work area cable 134. when when when when 135. more When is a straight-through cable used in a network? connecting a router through the console port connecting one switch to another switch connecting a host to a switch connecting a router to another router What is considered a benefit of wireless as a media choice? host mobility

lower security risks reduced susceptibility to interference less impact of the surroundings on the effective coverage area 136. In most business LANs, which connector is used with twisted-pair networking cable? BNC RJ-11 RJ-45

Type F 137. Which OSI layer is responsible for binary transmission, cable specification , and physical aspects of network communication? Presentation Transport Data Link Physical 138. Which fiber connector supports full duplex Ethernet? This one. 139. What is a primary role of the Physical layer in transmitting data on the ne twork? create the signals that represent the bits in each frame on to the media provide physical addressing to the devices determine the path packets take through the network control data access to the media 28 140. Refer to the exhibit. Which type of Category 5 cable is used to make an Eth ernet connection between Host A and Host B? coax cable rollover cable crossover cable straight-through cable 29 Chapter 9 141. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired? The hosts return to a listen-before-transmit mode. The hosts creating the collision have priority to send data. The hosts creating the collision retransmit the last 16 frames. The hosts extend their delay period to allow for rapid transmission. 142. Refer to the exhibit. The switch and workstation are administratively confi gured for full-duplex operation. Which statement accurately reflects the operation of this link? No collisions will occur on this link. Only one of the devices can transmit at a time. The switch will have priority for transmitting data. The devices will default back to half duplex if excessive collisions occur. 143. Why do hosts on an Ethernet segment that experience a collision use a rando m delay before attempting to transmit a frame? A random delay is used to ensure a collision-free link. A random delay value for each device is assigned by the manufacturer. A standard delay value could not be agreed upon among networking device vendors. A random delay helps prevent the stations from experiencing another collision du ring the transmission. 144. Ethernet operates at which layers of the OSI model? (Choose two.) Network layer Transport layer Physical layer Application layer Session layer Data-link layer 145. What does the IEEE 802.2 standard represent in Ethernet technologies?

MAC sublayer Physical layer Logical Link Control sublayer Network layer 30 146. Refer to the exhibit. Host_A is attempting to contact Server_B. Which state ments correctly describe the addressing Host_A will generate in the process? (Choose two.) A packet with the destination IP A frame with the destination MAC A packet with the destination IP A frame with the destination MAC A packet with the destination IP A frame with the destination MAC of Router_B. address of Switch_A. of Router_A. address of Router_A. of Server_B. address of Server_B.

147. Host A has an IP address of 172.16.225.93, a mask of 255.255.248.0, and a d efault gateway of 172.16.224.1. Host A needs to send a packet to a new host whose IP is 172.16.231.78. Host A performs the ANDing opera tion on its address and subnet mask. What two things will occur? (Choose two.) Host A will get a result of 172.16.224.0 from the AND process. Host A will send on to the media a broadcast frame that contains the packet. Host A will broadcast an ARP request for the MAC of the host 172.16.231.78. Host A will change the destination IP of the packet to 172.16.224.1 and forward the packet. Host A will encapsulate the packet in a frame with a destination MAC that is the MAC address associated with 172.16.224.1. 148. Which two features make switches preferable to hubs in Ethernet-based netwo rks? (Choose two.) reduction in cross-talk minimizing of collisions support for UTP cabling division into broadcast domains increase in the throughput of communications 149. What are three functions of the upper data link sublayer in the OSI model? (Choose three.) recognizes streams of bits identifies the network layer protocol makes the connection with the upper layers identifies the source and destination applications insulates network layer protocols from changes in physical equipment determines the source of a transmission when multiple devices are transmitting 150. What are the two most commonly used media types in Ethernet networks today? (Choose two.) coaxial thicknet copper UTP coaxial thinnet optical fiber shielded twisted pair 31 151. Refer to the exhibit. Which option correctly identifies content that the fr ame data field may contain? preamble and stop frame network layer packet physical addressing FCS and SoF 152. Which of the following describe interframe spacing? (Choose two.) the minimum interval, measured in bit-times, that any station must wait before s ending another frame

the maximum interval, measured in bit-times, that any station must wait before s ending another frame the 96-bit payload padding inserted into a frame to achieve a legal frame size the 96-bit frame padding transmitted between frames to achieve proper synchroniz ation the time allowed for slow stations to process a frame and prepare for the next f rame the maximum interval within which a station must send another frame to avoid bei ng considered unreachable 153. After an Ethernet collision, when the backoff algorithm is invoked, which d evice has priority to transmit data? the device involved in the collision with the lowest MAC address the device involved in the collision with the lowest IP address any device in the collision domain whose backoff timer expires first those that began transmitting at the same time 154. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below. 85 90 BA A1 B3 1C 155. Which of the following is a drawback of the CSMA/CD access method? Collisions can decrease network performance. It is more complex than non-deterministic protocols. Deterministic media access protocols slow network performance. CSMA/CD LAN technologies are only available at slower speeds than other LAN tech nologies. 156. Ethernet operates at which layer of the TCP/IP network model? application physical transport internet data link network access 32 157. In the graphic, Host A has reached 50% completion in sending a 1 KB Etherne t frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do? Host B can transmit immediately since it is connected on its own cable segment. Host B must wait to receive a CSMA transmission from the hub, to signal its turn . Host B must send a request signal to Host A by transmitting an interframe gap. Host B must wait until it is certain that Host A has completed sending its frame . 158. Which statements correctly describe MAC addresses? (Choose three.) dynamically assigned copied into RAM during system startup layer 3 address contains a 3 byte OUI 6 bytes long 32 bits long 159. What three primary functions does data link layer encapsulation provide? (C

hoose three.) addressing error detection frame delimiting port identification path determination IP address resolution 160. What is the primary purpose of ARP? translate URLs to IP addresses resolve IPv4 addresses to MAC addresses provide dynamic IP configuration to network devices convert internal private addresses to external public addresses33 Chapter 10 161. Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? (Choose two.) connecting a PC to a router's console port connecting two routers together via their fast ethernet ports connecting two switches together at gigabit speeds connecting a PC to a switch at Gigabit Ethernet speeds connecting two devices with the same interface type at Fast Ethernet speeds 162. Which option identifies the primary interface which would be used for initi al configuration of a Cisco router? AUX interface Ethernet interface serial interface console interface 163. What makes fiber preferable to copper cabling for interconnecting buildings ? (Choose three.) greater distances per cable run lower installation cost limited susceptibility to EMI/RFI durable connections greater bandwidth potential easily terminated 164. A network administrator is required to use media in the network that can ru n up to 100 meters in cable length without using repeaters. The chosen media mus t be inexpensive and easily installed. The installation will be in a pre-existin g building with limited cabling space. Which type of media would best meet these requirements? STP UTP coaxial single-mode fiber multimode fiber 165. What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device 166. How many host addresses may be assigned on each subnetwork when using the 1 30.68.0.0 network address with a subnet mask of 255.255.248.0?

30 256 2046 2048 4094 4096 34 167. Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork? 255.255.0.0 255.255.255.0 255.255.254.0 255.255.248.0 168. A company is planning to subnet its network for a maximum of 27 hosts. Whic h subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet? 255.255.255.0 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 169. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 170. Which device is used to create or divide broadcast domains? hub switch bridge router repeater 171. Refer to the exhibit. What destination IP address will PC1 place in the hea der for a packet destined for PC2? 192.168.1.1 192.168.2.1 192.168.2.2 192.168.3.1 192.168.3.54 35 172. Refer to the exhibit. Based on the IP configuration shown, what would be th e result of Host A and Host B attempting to communicate outside the network segment? both host A and B would be successful host A would be successful, host B would fail host B would be successful, host A would fail both Host A and B would fail 173. Which three types of connectors are commonly associated with Cisco's V.35 s erial cables? (Choose three.) RJ 11 DB 60 Winchester 15 pin DB 9 smart serial RJ 45 174. Refer to the exhibit. How many subnets are required to support the network

that is shown? 2345 175. What are three common methods for setting a UTP Ethernet port to MDI or MDI X operation? (Choose three.) direct configuration of the device cable color code association cable selection and configuration use of cable testers to determine pinouts the enabling of the mechanism to electrically swap the transmit and receive pair s the automatic detection and negotiating of MDI/MDIX operation of the port 36 176. Refer to the exhibit. A student is setting up a home network primarily used for extensive file transfers, streaming video, and gaming. Which network device is best suited to these types of activities in the topology shown? wireless access point router hub switch 177. Which three statements are true about the role of routers in the network? ( Choose three.) They propagate broadcasts. They enlarge collision domains. They They Each They segment broadcast domains. interconnect different network technologies. router interface requires a separate network or subnet. maintain a common frame format between LAN and WAN interfaces.

178. Refer to the exhibit. A network administrator has decided to use packet cap ture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured, what network d evice should be used to connect the monitoring station to the network between R1 and R2? router hub switch wireless access point 37 179. Refer to the exhibit. Assume that all devices are using default settings. H ow many subnets are required to address the topology that is shown? 13457 180. Refer to the exhibit. Which three statements are true about the exhibited t opology? (Choose three.) Hosts B and C are in the same subnet. Five broadcast domains are present. Host B is using a crossover cable to connect to the router. Four broadcast domains are present. Five networks are shown. Host B is using a rollover cable to connect to the router. 181. To establish a console connection from a computer to a Cisco router, which cable wiring option would be used? crossover cable straight through cable

rollover cable V.35 cable 38 182. Refer to the exhibit. Which three statements identify the type of cabling t hat would be used in the segments that are shown? (Choose three.) Segment 1 uses backbone cabling. Segment 1 uses a patch cable. Segment 3 uses patch cabling. Segment 3 uses vertical cabling. Segment 3 uses horizontal cabling. Segment 4 uses vertical cabling. 183. Refer to the exhibit. A network technician has been allocated the 192.168.1 .0/24 private IP address range for use in the network that shown in the exhibit. Which subnet mask would be used to meet the host requireme nts for segment A of this internetwork? 255.255.255.128 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 39 Chapter 11 184. Users in the network are experiencing slow response time when doing file tr ansfers to a remote server. What command could be issued to determine if the router has experienced any input or output errors? show running-config show startup-config show interfaces show ip route show version show memory 185. Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command? enable password class line console 0 password ccna enable secret cisco enable password class line console 0 password ccna enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password class line console 0 password ccna enable secret cisco

enable password 7 14141E0A1F17 line console 0 password 7 020507550A enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password 7 14141E0A1F17 line console 0 password 7 020507550A 40 186. Refer to the exhibit. A network administrator on HostA has problems accessi ng the FTP server. Layer three connectivity testing was successful from HostA to the S1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB and run debug commands? RouterB(config)# enable secret class RouterB(config)# line vty 0 4 RouterB(config-if)# login RouterB(config)# enable secret class RouterB(config)# line vty 0 2 RouterB(config-vty)# password cisco RouterB(config-vty)# login RouterB(config)# enable secret class RouterB(config)# line vty 0 RouterB(config-line)# password cisco RouterB(config-line)# login RouterB(config)# enable secret class RouterB(config)# line aux 0 RouterB(config-line)# password cisco RouterB(config-line)# login RouterB(config)# enable secret class RouterB(config)# line aux 0 RouterB(config-vty)# password cisco RouterB(config-vty)# login 187. The connection between routers B and C has been successfully tested. Howeve r, after rebooting router C, the administrator noticed the response time between networks 10.10.3.0 and 10.10.4.0 is slower. Ping between t he two routers is successful. A trace route indicates three hops from router B to router C. What else can be done to troubleshoot the proble m? Ping router B S0/1 connection from router C. Trace the connection between router B to router C S0/1. Issue a show ip route command in router B to verify routing is enabled. Issue a show ip interface brief command on router C. 188. In a Cisco router, when do changes made to the running-configuration take e ffect? after a system restart as the commands are entered when logging off the system

when the configuration is saved to the startup-configuration 41 189. Refer to the exhibit. Which names correctly identify the CLI mode represent ed by the prompt for Switch-East4#? (Choose two.) line configuration mode user executive mode global configuration mode privileged executive mode interface configuration mode enable mode 190. Refer to the exhibit. What command will place the router into the correct m ode to configure an appropriate interface to connect to a LAN? UBAMA# configure terminal UBAMA(config)# line vty 0 4 UBAMA(config)# line console 0 UBAMA(config)# interface Serial 0/0/0 UBAMA(config)# interface FastEthernet 0/1 191. Immediately after a router completes its boot sequence, the network adminis trator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.) show flash show NVRAM show startup-config show running-config show version 42 192. Refer to the exhibit. A student is responsible for the IP addressing, confi guration and connectivity testing of the network shown in the graphic. A ping fr om host B to host C results in a destination unreachable but a ping from host B to host A was successful. What two reasons could account for this failure based on the graphic and partial router output for the Dallas router? (Choose two.) The host A is turned off. The Fa0/0 interface on Dallas is shutdown. The LAN cable is disconnected from host B. The S0/0/1 IP address of Dallas is improperly configured. The Fa0/0 interface on Dallas is in a different subnet than host B. The clock rate is missing on the serial link between Dallas and NYC. 193. In a Cisco device, where is the IOS file stored prior to system startup? RAM ROM Flash NVRAM 43 194. On a Cisco router, which interface would be used to make the initial config uration? Console 195. A network administrator needs to keep the user ID, password, and session co ntents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen? Telnet Console AUX SSH

196. The serial connection shown in the graphic needs to be configured. Which co nfiguration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) Sydney(config-if)# ip address 201.100.53.2 255.255.255.0 Sydney(config-if)# no shutdown Sydney(config-if)# ip address 201.100.53.1 255.255.255.224 Sydney(config-if)# clock rate 56000 Sydney(config-if)# ip host Melbourne 201.100.53.2 44 197. Which three terms correctly define the forms of help available within the C isco IOS? (Choose three.) hot keys context-check context-sensitive structured check command override command syntax check 198. Refer to the exhibit. The output is shown for the show ip route command exe cuted on Router A. What does the IP address 192.168.2.2 represent? Gateway for Gateway for IP assigned IP assigned the 192.168.1.0 network the 192.168.3.0 network to the serial port on Router A to the serial port on Router B

199. Which combination of keys would be used at the CLI prompt to interrupt a pi ng or traceroute process? Ctrl-C Ctrl-P Ctrl-R Ctrl-Shift-6 Ctrl-Z 200. Refer to the exhibit. What additional command is required to allow remote a ccess to this switch? NA-SW1(config-if)# no shutdown NA-SW1(config)# enable passwordp a s sw o rd NA-SW1(config)# ip default-gatewayaddress NA-SW1(config-if)# descriptiondescription 201. When network services fail, which port is most often used to access a route r for management purposes? AUX 45 Ethernet Console Telnet SSH 202. What command is used to change the default router name to Fontana? Router# name Fontana Router# hostname Fontana Router(config)# name Fontana Router(config)# hostname Fontana 46 203. Refer to the exhibit. The output is shown for the show ip route command exe cuted on Router A. What does the IP address 192.168.2.2 represent? Gateway for the 192.168.1.0 network

Gateway for the 192.168.3.0 network IP assigned to the serial port on Router A IP assigned to the serial port on Router B CCNA 4 Blogspot - Final Exam Answers (1) 204. Identify the factors that contribute to congestion on an Ethernet LAN. (Cho ose three.) ?*** improper placement of enterprise level servers ?*** addition of hosts to a physical segment ?replacement of hubs with workgroup switches ?*** increasing use of bandwidth intensive network applications ?www.ccna-4.blogspot.com ?creation of new collision domains without first adding network hosts ?migration to full-duplex Ethernet within the LAN 205. Which of the following are examples of TCP/IP application layer protocols? (Choose three.) ?*** a terminal emulation protocol that supports remote console connections with various network devices ?a protocol created by IBM that makes it easier for mainframes to connect to rem ote offices ?*** a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet ?a protocol that controls the rate at which data is sent to another computer ?*** a protocol that exchanges network management information between a network device and a management console 206. Which of the following eliminates switching loops? ?hold-down timers ?poison reverse ?*** spanning tree protocol ?time to live ?split horizon protocol 207. The show cdp neighbors command is a very useful network troubleshooting too l. Using the output in the graphic, select the statements that are true. (Choose two.) ?CDP operates at the network layer of the OSI model. ?*** The output of this command displays information about directly connected Ci sco devices only. ?The switch is attached to the SanJose1 FastEthernet0/21 interface. ?SanJose1 is running CDP version 12.0. ?SanJose1 has two fully operational, cdp-enabled Cisco switches directly connect ed to it. ?*** SanJose2 is a 2600 series router running several routed protocols 208. A network administrator can ping the Denver router, but gets a 'Password Re quired but None Set' message when trying to connect remotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access? ?Router(config)# line console 0 Router(config-line)# login Router(config-line)# password cisco ?*** Router(config)# line vty 0 4 *** Router(config-line)# login *** Router(config-line)# password cisco ?Router(config)# line virtual terminal Router(config-line)# enable login 47 Router(config-line)# password cisco ?Router(config)# line vty 0 4

Router(config-line)# enable secret Router(config-line)# password cisco ?Router(config)# enable secret cisco Router(config)# enable cisco 209. Which of the following is associated with link-state routing protocols? ?low processor overhead ?poison reverse ?routing loops ?split horizon ?*** shortest-path first calculations 210. A router does not load its configuration after a power failure. After runni ng the show startup-configuration command, the adminstrator finds that the original configuration is intact. What is the cause of this probl em? ?The configuration register is set for 0x2100. ?The configuration register is set for 0x2101. ?The configuration register is set for 0x2102. ?*** The configuration register is set for 0x2142. ?Boot system commands are not configured. ?Flash memory is empty causing the router to bypass the configuration in NVRAM ?Nederst p formularen 211. Which commands are used to verify the content and placement of access contr ol lists? (Choose three.) ?*** show ip interface ?show ip route ?show processes ?*** show running-config ?show cdp neighbor ?*** show access-lists 212. Which of the following are required when creating a standard access control list? (Choose two.) destination address and wildcard mask ?*** source address and wildcard mask ?subnet mask and wildcard mask ?access list number between 100 and 199 or 2000 and 2699 ?*** access list number between 1 and 99 or 1300 to 1999 213. Which of the following are keywords that can be used in an access control l ist to replace a dotted decimal wildcard mask? (Choose two.) ?most ?*** host ?all ?*** any ?some ?sum 214. Refer to the diagram. All ports on Switch A are in the Sales VLAN and all p orts on Switch B are in the Accounting VLAN. How many broadcast domains and how many collision domains are shown? (Choose two). ?3 collision domains ?*** 3 broadcast domains ?5 broadcast domains ?*** 9 collision domains ?10 collision domains ?13 collision domains 215. Refer to the graphic. Using the most efficient IP addressing scheme and VLS

M, which address can be configured on one of the serial interfaces? ?192.168.16.63/27 ?192.168.16.158/27 ?192.168.16.192/27 ?192.168.16.113/30 ?192.168.16.145/30 ?*** 192.168.16.193/30 216. What is the purpose of the Spanning Tree Protocol (STP)? 48 ?*** prevents Layer 2 loops ?prevents routing loops on a router ?creates smaller collision domains ?creates smaller broadcast domains ?allows Cisco devices to exchange routing table updates 217. What is the purpose of a loopback address when using the OSPF routing proto col? ?activates the OSPF neighboring process ?*** ensures a persistent router ID for the OSPF process ?provides a backdoor for connectivity during the convergence process ?streamlines and speeds up the convergence process 218. Which statement is true regarding states of the IEEE 802.1d Spanning Tree P rotocol? ?Ports are manually configured to be in the forwarding state. ?*** Ports listen and learn before going into the forwarding state. ?Ports must be blocked before they can be placed in the disabled state. ?It takes 15 seconds for a port to go from blocking to forwarding 219. Which sequence of commands is used to configure a loopback address on a rou ter? ?Router1(config)# interface loopback 1 Router1(config-if)# ip address 192.168.1.1 ?Router1(config)# interface serial 0/0 Router1(config-if)# loopback 1 Router1(config-if)# ip address 192.168.1.1 ?Router1(config)# interface serial 0/0 Router1(config-if)# loopback 1 Router1(config-if)# ip address 192.168.1.1 255.255.255.0 ?*** Router1(config)# interface loopback 1 *** Router1(config-if)# ip address 192.168.1.1 255.255.255.255 220. Which routing protocols are classful and do not support VLSM? (Choose two.) ?EIGRP ?OSPF ?*** RIP v1 ?RIP v2 ?*** IGRP 221. Refer to the graphic. Two switches are connected together through a trunk p ort. SW2 displays the message shown. Which of the following will solve the duplex mismatch? ?SW1(config)# interface fastethernet 0/1 ?SW1(config-if)# duplex full ?SW1(config)# interface fastethernet 0/1 ?SW1(config-if)# full-duplex ?*** SW2(config)# interface fastethernet 0/1 ?*** SW2(config-if)# duplex full

?SW2(config)# interface fastethernet 0/1 ?SW2(config-if)# full-duplex 222. Refer to the graphic. Two routers have been configured to use EIGRP. Packet s are not being forwarded between the two routers. What could be the problem? ?EIGRP does not support VLSM. ?The routers were not configured to monitor neighbor adjacency changes. ?The default bandwidth was used on the routers. ?*** An incorrect IP address was configured on a router interface. ?According to the the provided router output, which of the following statements is true regarding PPP operation? ?Only the link-establishment phase completed successfully. ?Only the network-layer phase completed successfully. ?Neither the link-establishment phase nor the the network-layer phase completed successfully. ?*** Both the link-establishment and network-layer phase completed successfully 01. Which two pieces of information are typically found on a logical network dia gram? (Choose two.) cable types connector types interface identifiers DLCI for virtual circuits operating system versions Answer: interface identifiers; DLCI for virtual circuits 02. Excessive broadcasts are generally a symptom of a problem at which layer? physical data link network transport Answer: data link 03. What is one example of a physical layer problem? incorrect encapsulation incorrect STP configuration incorrect ARP mapping incorrect clock rate Answer: incorrect clock rate 04. Which two components should be taken into consideration when establishing a network baseline? (Choose two.) information about the network design IP addressing allocation on the network requirements about the service provider setup requirements for access control lists to regulate traffic expected performance under normal operating conditions Answer: information about the network design; expected performance under normal operating conditions 05.Refer to the exhibit. Which two steps should be taken during the process of c reating network documentation? (Choose two.) Record the information about the devices discovered in the Campus network only. Record the information about the devices discovered in the entire network, inclu ding the remote locations.

Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram. Transfer only the Layer 2 and Layer 3 information about the devices from the net work configuration table that corresponds to a component of the topology diagram . Transfer the recorded information about the devices from the network configurati on table gathered during peak network utilization that corresponds to a componen t of the topology diagram. Answer: Record the information about the devices discovered in the entire networ k, including the remote locations; Transfer any information about the devices fr om the network configuration table that corresponds to a component of the topolo gy diagram. 06. Which two statements are true concerning logical networking models? (Choose two.) TCP/IP splits the lowest layer of the OSI model into two separate layers. The top layer of the TCP/IP model combines the functions of the top three OSI la yers. Troubleshooting with the TCP/IP model requires different techniques than with th e OSI model. The network access layer is responsible for exchanging packets between devices o n a TCP/IP network. The Internet layer provides communication between applications, such as FTP, HTT P, and SMTP on separate hosts. The TCP/IP network access layer corresponds to the OSI physical and data link la yers. Answer: The top layer of the TCP/IP model combines the functions of the top thre e OSI layers; The TCP/IP network access layer corresponds to the OSI physical an d data link layers. 07. Clients across the company are reporting poor performance across all corpora te applications running in the data center. Internet access and applications run ning across the corporate WAN are performing normally. The network administrator observes a continual broadcast of random meaningless traffic (jabber) on the ap plication server LAN in the data center on a protocol analyzer. How should the a dministrator start troubleshooting? The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a re cent NIC driver update or bad cabling. Because all clients are experiencing application problems, the administrator sho uld use a top-down approach with the application servers in the data center. The scope of the problem indicates a likely routing or spanning-tree problem. Be gin by checking routing tables, and follow up using appropriate STP show command s to find a loop if routing is working normally. Poll the staff to determine if any recent changes have been made. Back out all t he changes one by one until the error condition is fixed. Answer: The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling. 08. Which troubleshooting approach is suggested for dealing with a complex probl em that is suspected of being caused by faulty network cabling? bottom up top down

divide and conquer middle out Answer: bottom up 09. A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes? baselining tool knowledge base protocol analyzer cable tester Answer: baselining tool 10. A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshoo ting tool allows the technician to map and discover VLAN and port assignments? cable analyzer network analyzer protocol analyzer knowledge base Answer: network analyzer 11.Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correctly. Which OSI layer should the administrator begin to trouble shoot next? physical data link network application Answer: application 12. When gathering symptoms for troubleshooting a network problem, which step co uld result in getting an external administrator involved in the process? narrowing the scope gathering symptoms from suspect devices analyzing existing symptoms determining ownership Answer: determining ownership 13.Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.) A carrier detect signal is present. Keepalives are being received successfully. Default encapsulation is used on this serial link. Packets passing this interface cannot exceed 1 KB in size. The reliability of this link is very low. The LCP negotiation phase is complete. Answer: A carrier detect signal is present; Keepalives are being received succes

sfully; The LCP negotiation phase is complete 14.Refer to the exhibit. Users at Branch B are reporting trouble accessing a cor porate website running on a server that is located at HQ. HQ and Branch A users can access the website. R3 is able to ping 10.10.10.1 successfully but not 10.10 .10.2. The users at Branch B can access servers at Branch A. Which two statement s are true aboutthe troubleshooting efforts? (Choose two.) The web server should be tested for an application layer problem. Frame Relay at R3 and R2 should be tested to narrow the scope of the problem. The fact that users at Branch A are working normally proves that there is no pro blem at R2. An ACL entry error could cause the failure at Layer 4 in either R3 or R2. The successful ping from R3 to R1 proves that the WAN is functioning normally. T herefore, the problem has to be in the upper layers. Answer: Frame Relay at R3 and R2 should be tested to narrow the scope of the pro blem; An ACL entry error could cause the failure at Layer 4 in either R3 or R2. 15. Users are complaining of very long wait times to access resources on the net work. The show interface command reveals collision counts far above the network baseline. At which OSI layer should the administrator begin troubleshooting? application transport network data link physical Answer: physical Refer to the exhibit. A network technician determines DHCP clients are not worki ng properly. The clients are receiving IP configuration information from a DHCP server configured on the router but cannot access the Internet. From the output in the graphic, what is the most likely problem? The DHCP server service is not enabled. The inside interface for DCHP is not defined. The DHCP pool is not bound to the interface. The pool does not have a default router defined for the clients. All the host addresses have been excluded from the DHCP pool. Answer:The pool does not have a default router defined for the clients. Refer to the exhibit. On the basis of the configuration shown, how should the po ol of the excluded addresses be assigned to key hosts on the network, such as ro uter interfaces, printers, and servers? * The addresses are statically assigned by the network administrator. * The DHCP server dynamically assigns the addresses. * The addresses must be listed under the DHCP pool of addresses before they are available for static assignment. * The addresses must be listed under the DHCP pool of addresses before they are available for dynamic assignment. Answer:The addresses are statically assigned by the network administrator. Refer to the exhibit. According to the output, how many addresses have been succ essfully assigned or renewed by this DHCP server? * 1 * 6 * 7

* 8 * 9 Answer:8 04. What are two benefits of NAT? (Choose two.) * * * * * It It It It It saves public IP addresses. adds a degree of privacy and security to a network. increases routing performance. makes troubleshooting routing issues easier. makes tunneling with IPsec less complicated.

Answer:It saves public IP addresses; It adds a degree of privacy and security t o a network. 05. What is true regarding the differences between NAT and PAT? * PAT uses the word overload at the end of the access-list statement to share a single registered address. * Static NAT allows an unregistered address to map to multiple registered ad dresses. * Dynamic NAT allows hosts to receive the same global address each time exte rnal access is required. * PAT uses unique source port numbers to distinguish between translations. Answer:PAT uses unique source port numbers to distinguish between translations. 06. What type of NAT should a network administrator use to ensure that a web ser ver on the inside network is always available to the outside network? * * * * NAT overload static NAT dynamic NAT PAT

Answer:static NAT Refer to the exhibit. Which address or addresses represent the inside global add ress? * * * * 10.1.1.2 192.168.0.100 209.165.20.25 any address in the 10.1.1.0 network

Answer:209.165.20.25 Refer to the exhibit. Which two statements about the configuration are true? (Ch oose two.) * Traffic from the 10.1.1.0 network will be translated. * Traffic from the 209.165.200.0 network will be translated. * Permitted traffic gets translated to a single inside global IP address. * A pool of inside global IP addresses from the 10.1.1.0 network will be use d for translation. * External users from the 209.165.200.0 network can reach private addresses on the 10.1.1.0 and 10.1.2.0 networks.

Answer:Traffic from the 10.1.1.0 network will be translated; Permitted traffic g ets translated to a single inside global IP address. Refer to the exhibit. What is the purpose of the command marked with an arrow sh own in the partial configuration output of a Cisco broadband router? * * * * defines defines defines defines which which which which addresses addresses addresses addresses can are are are be translated allowed into the router assigned to a NAT pool allowed out of the router

Answer:defines which addresses can be translated 10. A technician has been told by a supervisor to always clear any dynamic trans lations before attempting to troubleshoot a failed NAT connection. Why has the s upervisor issued these instructions? * The supervisor wants to clear any confidential information that may be see n by the technician. * Because entries can be cached for long periods of time, the supervisor wan ts to prevent decisions being made based on old data. * The translation table may be full and is unable to make new translations u ntil space is available. * Clearing the translations causes the starting configuration to be reread a nd may correct translation problems that have occurred. Answer:Because entries can be cached for long periods of time, the supervisor wa nts to prevent decisions being made based on old data. Refer to the exhibit. Traffic exiting R1 is failing translation. What part of th e configuration is most likely incorrect? * * * * ip nat pool statement access-list statement ip nat inside is on the wrong interface interface s0/0/2 should be a private IP address

Answer:access-list statement Refer to the exhibit. A technician used SDM to enter the NAT configuration for a Cisco router. Which statement correctly describes the result of the configurati on? * A user on the inside sees web traffic coming from 192.168.1.3 using port 8 080. * The address 172.16.1.1 is translated into an address from the pool beginni ng with 192.168.1.3. * A user on the outside network sees a request addressed from 192.168.1.3 us ing port 80. * A user on the outside must address traffic to port 8080 to reach the addre ss 172.16.1.1. Answer:A user on the outside network sees a request addressed from 192.168.1.3 u sing port 80. Refer to the exhibit. How many IPv6 broadcast domains exist in this topology? * 0 * 1

* 2 * 3 * 4 Answer:0 14. A network administrator wants to connect two IPv6 islands. The easiest way i s through a public network that uses only IPv4 equipment. What simple solution s olves the problem? * * * * Replace the devices on the public network with devices that support IPv6. Configure RIPng on the border routers of each IPv6 island. Configure the routers to take advantage of dual-stack technology. Use tunneling to encapsulate the IPv6 traffic in the IPv4 protocol.

Answer:Use tunneling to encapsulate the IPv6 traffic in the IPv4 protocol. 15. After activating IPv6 routing on a Cisco router and programming IPv6 address es on multiple interfaces, what is the remaining step to activate RIPng? * Enter the interface programming mode for each IPv6 interface and enable IP ng RIP. * Enter the ipv6 router rip name command and then use network statements to activate RIPng on the interfaces. * Enter the router rip command, and then activate RIPng using the version co mmand. RIPng then automatically runs on all IPv6 interfaces. * Enter the interface programming mode for each IPv6 interface and enable th e multicast group FF02::9, and then activate RIPng globally using the ipv6 route r rip name command. Answer:Enter the interface programming mode for each IPv6 interface and enable I Png RIP. Refer to the exhibit. The FTP server has an RFC 1918 private address. Users on t he Internet need to connect to the FTP server on the Fa0/0 LAN of R1. Which thre e configurations must be completed on R1? (Choose three.) * * * * * * dynamic NAT NAT with overloading open port 20 open port 21 open port 23 NAT with port forwarding

Answer:open port 20; NAT with port forwarding; open port 21 Refer to the exhibit. R1 is performing NAT for the 10.1.1.0/24 network, and R2 i s performing NAT for the 192.168.1.2/24 network. What would be valid destination IP address for HostA to put in its IP header when communicating with the web se rver? * * * * 10.1.1.1 172.30.20.2 192.168.1.2 255.255.255.255

Answer:172.30.20.2 Refer to the exhibit. Which two addresses could be assigned to traffic leaving S 0 as a result of the statement ip nat pool Tampa 179.9.8.96 179.9.8.111 netmask

255.255.255.240? (Choose two.) * * * * * 10.0.0.125 179.9.8.95 179.9.8.98 179.9.8.101 179.9.8.112

Answer:179.9.8.101; 179.9.8.98 Refer to the exhibit. IPv6 address 2006:1::1/64 eui-64 has been configured on th e router FastEthernet0/0 interface. Which statement accurately describes the EUI -64 identifier configuration? * It will randomly generate a 64 bit interface ID. * It will assign an address from the pool of IPv6 private addresses to the i nterface. * It will assign only the registry prefix of the IPv6 Global Unicast address to the interface. * The configuration will derive the interface portion of the IPv6 address fr om the MAC address of the interface. Answer:The configuration will derive the interface portion of the IPv6 address f rom the MAC address of the interface. 20. How many bits of an IPv6 address are used to identify the interface ID? * * * * 32 48 64 128

Answer:64 21. Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your s ervice provider. With this prefix, how many bits are available for your organiza tion to create subnetworks? * * * * 8 16 80 128

Answer:16 01. Which two statements about DSL are true? (Choose two.) * * * * * users are on a shared medium uses RF signal transmission local loop can be up to 3.5 miles (5.5km) physical and data link layers are defined by DOCSIS user connections are aggregated at a DSLAM located at the CO

Answer: local loop can be up to 3.5 miles (5.5km); user connections are aggregat ed at a DSLAM located at the CO 02. Which two Layer 1 requirements are outlined in the Data-over-Cable Service I nterface Specification (DOCSIS)? (Choose two.) * channel widths

* access method * maximum data rate * modulation techniques * compression techniques Answer:channel widths; modulation techniques 03. Which two statements are valid solutions for a cable ISP to reduce congestio n for users? (Choose two.) * use higher RF frequencies * allocate an additional channel * subdivide the network to reduce users on each segment * reduce the length of the local loop to 5.5 kilometers or less * use filters and splitters at the customer site to separate voice from data traffic Answer:allocate an additional channel; subdivide the network to reduce users on each segment 04. A technician has been asked to configure a broadband connection for a telewo rker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be u sed? * * * * cable DSL ISDN POTS

Answer: DSL 05. After conducting research to learn about common remote connection options fo r teleworkers, a network administrator has decided to implement remote access ov er broadband to establish VPN connections over the public Internet. What is the result of this solution? * A reliable connection is established at greater speeds than what is offere d from dialup over POTS. Security is increased, but username and password inform ation are sent in plain text. * The connection has increased security and reliable connectivity. Users nee d a remote VPN router or VPN client software. * Security and reliability are increased at a substantial loss in throughput , which is considered acceptable when supporting a single user environment. * Reliability and security are increased without the need for additional equ ipment, when compared to dialup connections using POTS. Answer:The connection has increased security and reliable connectivity. Users ne ed a remote VPN router or VPN client software. 06. What are the three main functions of a secure VPN? (Choose three.) * * * * * * accounting authentication authorization data availability data confidentiality data integrity

Answer: authentication; data confidentiality; data integrity

07. Which two methods could an administrator use to authenticate users on a remo te access VPN? (Choose two.) * * * * * digital certificates ESP hashing algorithms smart cards WPA

Answer:smart cards; digital certificates 08. Data confidentiality through a VPN is achieved through which two methods? (C hoose two.) * * * * * digital certificates encryption encapsulation hashing passwords

Answer: encryption; encapsulation 09. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.) * * * * * * AES DES AH hash MPLS RSA DES RSA

Answer:AES

10. Which is an example of symmetric-key encryption? * * * * Diffie-Hellman digital certificate pre-shared key RSA signature

Answer: pre-shared key 11. Which statement describes cable? * n the * * * . Delivering services over a cable network requires downstream frequencies i 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range. The cable subscriber must purchase a cable modem termination system (CMTS) Each cable subscriber has dedicated upstream and downstream bandwidth. Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path

Answer: Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range. 12. A company is using WiMAX to provide access for teleworkers. What home equipm ent must the company provide at the teleworker s site? * a WiMAX tower * a one-way multicast satellite

* a WiMAX receiver * an access point connected to the company WLAN Answer:a WiMAX receiver 13. Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.) * * * * * supports municipal wireless networks utilizing mesh technologies covers areas as large as 7,500 square kilometers supports point-to-point links, but not full mobile cellular-type access connects directly to the Internet through high-bandwidth connections operates at lower speeds than Wi-Fi, but supports many more users

Answer:covers areas as large as 7,500 square kilometers; connects directly to th e Internet through high-bandwidth connections 14. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed b y the technician? * Data is being transmitted from the subscriber to the headend. * Data is flowing downstream. * Cable television transmissions are interfering with voice and data transmi ssions. * The system is experiencing congestion in the lower frequency ranges. Answer:Data is being transmitted from the subscriber to the headend. Refer to the exhibit. All users have a legitimate purpose and the necessary perm issions to access the Corporate network. Based on the topology shown, which loca tions are able to establish VPN connectivity with the Corporate network? * Locations C, D, and E can support VPN connectivity. Locations A ire an additional PIX Firewall appliance installed on the edge of the * Locations C and E can support VPN connectivity. Locations A, B, ire an additional PIX Firewall appliance installed on the edge of the * Locations A, B, D, and E can support VPN connectivity. Location an additional router on the edge of the network. * All locations can support VPN connectivity. and B requ network. and D requ network. C requires

Answer: All locations can support VPN connectivity. 16. What two protocols provide data authentication and integrity for IPsec? (Cho ose two.) * * * * * AH L2TP ESP GRE PPTP

Answer:AH; ESP 17. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.) * * * * * * ATM CHAP IPsec IPX MPLS PPTP

Answer:IPsec; PPTP Refer to the exhibit. A teleworker is connected over the Internet to the HQ Offi ce. What type of secure connection can be established between the teleworker and the HQ Office? * * * * a GRE tunnel a site-to-site VPN a remote-access VPN the user must be at the office location to establish a secure connection

Answer:a remote-access VPN By default, how is IP traffic filtered in a Cisco router? blocked in and out of all interfaces blocked on all inbound interfaces, but permitted on all outbound interfaces blocked on all outbound interfaces, but permitted on all inbound interfaces Answer: permitted in and out of all interfaces Which three parameters can ACLs use to filter traffic? (Choose three.) packet size source router interface destination router interface Answer: destination address; source address ;protocol suite

How do Cisco standard ACLs filter traffic? by destination UDP port by protocol type by source UDP port by destination IP address Answer: by source IP address Which two statements are correct about extended ACLs? (Choose two) Extended ACLs use a number range from 1-99. Extended ACLs end with an implicit permit statement. Multiple ACLs can be placed on the same interface as long as they are in the sam e direction. Answer: Port numbers can be used to add greater definition to an ACL. Extended A CLs evaluate the source and destination addresses.

Where should a standard access control list be placed? close to the source on an Ethernet port on a serial port Answer: close to the destination Which three statements describe ACL processing of packets? (Choose three.) A packet that has been denied by one statement can be permitted by a subsequent statement. A packet that does not match the conditions of any ACL statements will be forwar ded by default. Each packet is compared to the conditions of every statement in the ACL before a forwarding decision is made. Answer: Each statement is checked only until a match is detected or until the en d of the ACL statement list. A packet can either be rejected or forwarded as dir

ected by the statement that is matched. An implicit deny any rejects any packet that does not match any ACL statement.

Which two statements are true regarding the significance of the access control l ist wildcard mask 0.0.0.7? (Choose two.) The first 29 bits of a given IP address will be ignored. The first 32 bits of a given IP address will be checked. The last 3 bits of a given IP address will be checked. Answer: The first 29 bits of a given IP address will be checked. The last 3 bits of a given IP address will be ignored.

Which two statements are true regarding the following extended ACL? (Choose two. ) All traffic is implicitly denied. FTP traffic destined for the 172.16.3.0/24 network is denied. Telnet traffic originating on network 172.16.3.0/24 is denied. Answer: Web traffic originating from 172.16.3.0 is permitted. FTP traffic origin ating from network 172.16.3.0/24 is denied.

Interface s0/0/0 already has an IP ACL applied inbound. What happens when the ne twork administrator attempts to apply a second inbound IP ACL? Both ACLs are applied to the interface. The network administrator receives an error. Only the first ACL remains applied to the interface. Answer: The second ACL is applied to the interface, replacing the first. 10.Refer to the exhibit. When creating an extended ACL to deny traffic from the 192.168.30.0 network destined for the Web server 209.165.201.30, where is the be st location for applying the ACL? ISP Fa0/0 outbound R2 S0/0/1 inbound R3 S0/0/1 outbound Answer: R3 Fa0/0 inbound Which two statements are true regarding named ACLs? (Choose two.) Only named ACLs allow comments. Names can be used to help identify the function of the ACL. Named ACLs offer more specific filtering options than numbered ACLs. More than one named IP ACL can be configured in each direction on a router inter face. Answer: Certain complex ACLs, such as reflexive ACLs, must be defined with named ACLs. Which three items must be configured before a dynamic ACL can become active on a router? (Choose three.) reflexive ACL console logging user account with a privilege level of 15 Answer: Telnet connectivity ;authentication ;extended ACL

13.Refer to the exhibit. How does this access list process rce address 10.1.1.1 and a destination of 192.168.10.13? It is allowed because of the implicit deny any. It is allowed because line 10 of the ACL allows packets to It is allowed because line 20 of the ACL allows packets to 3. Answer: It is dropped because it does not match any of the

a packet with the sou 192.168.0.0/16. the host 192.168.10.1 items in the ACL.

14. A network administrator needs to allow traffic through the firewall router f or sessions that originate from within the company network, but the administrato r must block traffic for sessions that originate outside the network of the comp any. What type of ACL is most appropriate? dynamic port-based time-based Answer: reflexive 15.Refer to the exhibit. How will Router1 treat traffic matching the time-range requirement of EVERYOTHERDAY? TCP traffic entering fa0/0 from 172.16.1.254/24 destined to the 10.1.1.0/24 netw ork is permitted. TCP traffic entering fa0/0 from 10.1.1.254/24 destined to the 172.16.1.0/24 netw ork is permitted. Telnet traffic entering fa0/0 from 172.16.1.254/24 destined to the 10.1.1.0/24 n etwork is permitted. Answer: Telnet traffic entering fa0/0 from 10.1.1.254/24 destined to the 172.16. 1.0/24 network is permitted. The ACL is correctly applied to an interface. What can be concluded about this s et of commands? The access list statements are misconfigured. All nodes on the 172.16.0.0 network will be denied access to other networks. No traffic will be allowed to access any nodes or services on the 172.16.0.0 net work. Answer: The wildcard mask 0.0.0.0 is assumed. 17.Refer to the exhibit. The administrator wishes to block web traffic from 192. 168.1.50 from reaching the default port of the web service on 192.168.3.30. To d o this, the access control list name is applied inbound on the router R1 LAN int erface. After testing the list, the administrator has noted that the web traffic remains successful. Why is web traffic reaching the destination? Web traffic does not use port 80 by default. The access list is applied in the wrong direction. The access list needs to be placed closer to the destination, on R3. The range of source addresses specified in line 10 does not include host 192.168 .1.50. 18.Refer to the exhibit. What will be the effect of the configuration that is sh own? Hosts connecting to resources in the 191.68.30.0/24 network have an idle timeout of 15 minutes. Anyone attempting to telnet into R3 will have an absolute time limit of five min utes. Telnet access to R3 will only be permitted on Serial 0/0/1.

Answer: Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3. 19. Which statement about standard ACLs is true? Standard ACLS must be numbered and cannot be named. They can filter based on source and destination address as well as on source and destination port. When applied to an outbound interface, incoming packets are processed before the y are routed to the outbound interface. Answer: They should be placed as close to the destination as possible. Which two statements are true regarding network security? (Choose two.) Securing a network against internal threats is a lower priority because company employees represent a low security risk. Both experienced hackers who are capable of writing their own exploit code and i nexperienced individuals who download exploits from the Internet pose a serious threat to network security. Assuming a company locates its web server outside the firewall and has adequate backups of the web server, no further security measures are needed to protect th e web server because no harm can come from it being hacked. Established network operating systems like UNIX and network protocols like TCP/I P can be used with their default settings because they have no inherent security weaknesses. Answer: Protecting network devices from physical damage caused by water or elect ricity is a necessary part of the security policy. Which two statements are true about network attacks? (Choose two.) Strong network passwords mitigate most DoS attacks. Worms require human interaction to spread, viruses do not. Reconnaissance attacks are always electronic in nature, such as ping sweeps or p ort scans. A brute-force attack searches to try every possible password from a combination of characters. Answer: Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to pr event attacks such as port redirection. Users are unable to access a company server. The system logs show that the serve r is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring? reconnaissance access worm virus Trojan horse Answer: DoS An IT director has begun a campaign to remind users to avoid opening e-mail mess ages from suspicious sources. Which type of attack is the IT director trying to protect users from? DoS DDoS access reconnaissance Answer: virus

Which two statements regarding preventing network attacks are true? (Choose two. ) The default security settings for modern server and PC operating systems can be trusted to have secure default security settings. Intrusion prevention systems can log suspicious network activity, but there is n o way to counter an attack in progress without user intervention. Physical security threat mitigation consists of controlling access to device con sole ports, labeling critical cable runs, installing UPS systems, and providing climate control. Phishing attacks are best prevented by firewall devices. Answer: Changing default usernames and passwords and disabling or uninstalling u nnecessary services are aspects of device hardening. Intrusion detection occurs at which stage of the Security Wheel? securing testing improvement reconnaissance Answer: monitoring Which two objectives must a security policy accomplish? (Choose two.) provide a checklist for the installation of secure servers describe how the firewall must be configured document the resources to be protected identify the specific tasks involved in hardening a router Answer: identify the security objectives of the organization What are three characteristics of a good security policy? (Choose three.) It defines acceptable and unacceptable use of network resources. It communicates consensus and defines roles. It is developed by end users. It is developed after all security devices have been fully tested. It should be encrypted as it contains backups of all important passwords and key s. Answer: It defines how to handle security incidents. Which two statements define the security risk when DNS services are enabled on t he network? (Choose two.) DNS name queries require the ip directed-broadcast command to be enabled on the Ethernet interfaces of all routers. Using the global configuration command ip name-server on one router enables the DNS services on all routers in the network. The router configuration does not provide an option to set up main and backup DN S servers. Answer: The basic DNS protocol does not provide authentication or integrity assu rance. By default, name queries are sent to the broadcast address 255.255.255.25 5.

What are two benefits of using Cisco AutoSecure? (Choose two.) It gives the administrator detailed control over which services are enabled or d isabled. It offers the ability to instantly disable non-essential system processes and se

rvices. It automatically configures the router to work with SDM. It ensures the greatest compatibility with other devices in your network. Answer: It allows the administrator to configure security policies without havin g to understand all of the Cisco IOS software features. 11.Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but it is not functioning correctly. What could be the problem? The authentication method is not configured correctly. The HTTP server is not configured correctly. The HTTP timeout policy is not configured correctly. Answer: The privilege level of the user is not configured correctly. The Cisco IOS image naming convention allows identification of different version s and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.) The mz in the filename represents the special capabilities and features of the IOS . The file is uncompressed and requires 2.6 MB of RAM to run. The file is downloadable and 121.4MB in size. Answer: The IOS is for the Cisco 2600 series hardware platform. The software is version 12.1, 4th revision.

13.Refer to the exhibit. The network administrator is trying to back up the Cisc o IOS router software and receives the output shown. What are two possible reaso ns for this output? (Choose two.) The Cisco IOS file has an invalid checksum. The TFTP client on the router is corrupt. There is not enough room on the TFTP server for the software. Answer: The TFTP server software has not been started. The router cannot connect to the TFTP server.

14. Which two conditions should the network administrator verify before attempti ng to upgrade a Cisco IOS image using a TFTP server? (Choose two.) Verify the name of the TFTP server using the show hosts command. Verify that the TFTP server is running using the tftpdnld command. Verify that the checksum for the image is valid using the show version command. Verify connectivity between the router and TFTP server using the ping command. Answer: Verify that there is enough flash memory for the new Cisco IOS image usi ng the show flash command. 15. The password recovery process begins in which operating mode and using what type of connection? (Choose two.) ROM monitor boot ROM Cisco IOS network connection through the Ethernet port network connection through the serial port Answer: direct connection through the console port 16.Refer to the exhibit. Security Device Manager (SDM) is installed on router R1 . What is the result of opening a web browser on PC1 and entering the URL https:

//192.168.10.1? The password is sent in plain text. A Telnet session is established with R1. The R1 home page is displayed and allows the user to download Cisco IOS images a nd configuration files. Answer: The SDM page of R1 appears with a dialog box that requests a username an d password. Which best describes the benefit of using Frame Relay as opposed to a leased lin e or ISDN service? Customers can define their virtual circuit needs in far greater combinations, wi th increments as small as 64 kbps. Customers pay for an end-to-end connection that includes the local loop and the network link. Connecting new sites requires new lower cost circuit installations when compared to ISDN dialup costs or adding additional hardware for leased service. Answer: Customers only pay for the local loop and the bandwidth they purchase fr om the network provider. What two methods does Frame Relay technology use errors? (Choose two.) It requires the receiving device to request that frames. FECN, BECN, and DE bits are set in the frames to Answer: Frame Relay services depend on the upper recovery. to process frames that contain the sender retransmit erroneous minimize errors. layer protocols to handle error

The frame relay switch notifies the sender that errors were detected. What best describes the use of a data-link connection identifier (DLCI)? local address identifying a destination router across a Frame Relay network locally significant address used to identify a virtual circuit logical address identifying the interface between a router and a Frame Relay swi tch logical address used to identify the DCE Answer: The receiving device drops any frames that contain errors without notify ing the sender.

What is created between two DTEs in a Frame Relay network? ISDN circuit limited access circuit switched parallel circuit Answer: virtual circuit

Which two items allow the router to map data link layer addresses to network lay er addresses in a Frame Relay network? (Choose two.) ARP RARP Proxy ARP Inverse ARP ICMP Answer: LMI status messages

Refer to the exhibit. A ping is sent to address 192.168.50.10 from the Peanut ro uter. Which DLCI will be used to send the ping? 115 220 225 Answer: 110

Refer to the exhibit. What effect does the point-to-point configuration on subin terface S0/0.110 have on the operation of the router? It helps to conserve IP addresses. It establishes multiple PVC connections to multiple physical interfaces. It requires the configuration of the encapsulation command on the subinterface. Answer: It eliminates split horizon issues without increasing the likelihood of routing loops.

Which three actions might a Frame Relay switch perform when it detects an excess ive build-up of frames in its queue? (Choose three.) puts a hold on accepting frames in excess of the CIR drops frames from the queue that have the DE bit set reduces the number of frames it sends over the link re-negotiates flow control with the connected device sets the FECN bit on all frames it receives on the congested link Answer: sets the BECN bit on all frames it places on the congested link

Refer to the exhibit. Which two statements are true given the output shown? (Cho ose two.) The IP address of the local Frame Relay interface is 172.16.1.4. This interface is in the active state and in the process of negotiating configur ation parameters. Multicast is not enabled on this connection. Answer: Inverse ARP is being used on this connection. The local DLCI number is 4 01.

Which Frame Relay topology is a compromise of costs, reliability, and complexity when the WAN contains one headquarters site, 40 regional sites, and several sit es within each regional site? star full mesh point-to-multipoint point-to-point Answer: partial mesh

Refer to the exhibit. What can be determined about the Frame Relay switch from t he output shown? It is currently not transmitting data. It is in the process of establishing the PVC.

It has put a hold on processing frames in excess of the CIR. Answer: It is experiencing congestion.

Refer to the exhibit. Frame Relay connectivity has been configured in the networ k and OSPF is used as the routing protocol. Router R1 can successfully ping the router R2 serial interface. When R1 attempts to ping network 192.168.3.0/24 the ping fails. What additional configuration should be applied on all routers to re medy the problem? Issue the frame-relay interface-dlci command in addition to the frame-relay map command on both router interfaces. Remove the frame-relay map command and replace with the frame-relay interface-dl ci command on both router interfaces. Apply the no frame-relay inverse-arp command on both router interfaces. Answer: Add the broadcast keyword in the Frame Relay map command on both routers .

Which statement about Frame Relay subinterfaces is correct? Multipoint interfaces will automatically forward routing broadcasts but will con sume more IP addresses than point-to-point subinterfaces will consume. Interfaces with multiple PVCs require a separate subinterface for each PVC. Multipoint configurations cannot use subinterfaces. Answer: Point-to-point subinterfaces act like leased lines and eliminate split-h orizon routing issues. Refer to the exhibit. You are a network administrator who has been tasked with c ompleting the Frame Relay topology that interconnects two remote sites. Router H Q belongs to both the 172.16.1.0/24 and 172.16.2.0/24 subnets with IP addresses of 172.16.1.3 and 172.16.2.3 respectively. Traffic between R1 and R2 must travel through HQ first. How should the serial interface on HQ be configured to comple te the topology? one multipoint subinterface with the physical interface configured with two ip addresses one IP address on a point-to-point subinterface and one IP address on the physic al interface Answer: two point-to-point subinterfaces

What consideration must be taken into account if RIP is used on Frame Relay mult iaccess networks? Inverse ARP must be enabled to turn routing update broadcasts into unicast traff ic that can be propagated to other Frame Relay nodes. Because broadcast traffic is not supported, RIPv1 cannot be implemented on Frame Relay networks. To forward broadcast routing updates, dynamic mapping must be enabled. Answer: To forward routing updates, address-to-DLCI mapping must be done via the use of the frame-relay map command coupled with the broadcast keyword.

Refer to the exhibit. Which statement explains why the Frame Relay connection be tween R1 and R2 is failing? Split horizon must be disabled. The LMI type must be specified.

Logical subinterfaces must be used instead. Answer: The frame-relay map commands are using incorrect DLCIs.

18.Refer to the exhibit. What can be known about the configuration of router R1 from the output? The Frame Relay LMI DLCI has been incorrectly configured as DLCI 1023. The Frame Relay LMI type has been changed from its default. The Serial 0/0/0 interface has been configured as a data communications equipmen t device. Answer: The command encapsulation frame-relay ietf has been used on the Serial 0 /0/0 interface.

19.Refer to the exhibit. What can be determined about the configuration of route r R1 from the exhibited output? LMI updates are not being received properly. Cisco HDLC is used as a Layer 2 encapsulation protocol on the Serial 0/0/0 inter face. The Serial 0/0/0 interface has been configured as a data communications equipmen t device. Answer: The LMI type for the Serial 0/0/0 interface has been left to its default configuration.

20.Refer to the exhibit. What can be determined from the output? Serial 0/0/0 has been configured with an DLCI of 201. Serial 0/0/0 has been configured with an IP address of 172.16.4.3. Serial 0/0/0 has been configured with the command frame-relay map ip 172.16.4.3 201 broadcast. Answer: Serial 0/0/0 has the feature frame-relay inverse-arp enabled.

Which two statements are true about time-division multiplexing (TDM)? (Choose tw o.) TDM relies on Layer 3 protocols to operate. Multiple channels can transmit over a single link. TDM methods vary depending on the Layer 2 protocol that is used. It allows information from multiple channels to be allocated bandwidth on multip le wires. Answer: Original data streams must be reconstructed at the destination.

What does the demarcation point represent in data communication physical circuit s? DTE/DCE interface on the device connecting to the Internet location of the firewall or router tag assigned to the physical block where a cross-connect occurs Answer: physical point at which the public network ends and the private customer network begins

Which serial communications DTE/DCE interface standard is used to provide high-s peed connectivity of up to 52 Mbps between LANs and is found on many high-end Ci

sco routers? EIA/TIA 232 (RS-232) EIA/TIA 422 (RS-422) EIA/TIA 423 (RS-423) ITU V.35 Answer: EIA/TIA-612/613 (HSSI)

Why are serial connections preferred over parallel connections for long transmis sion lengths? Parallel connections do not support error checking. Parallel connections are subject to excessive attenuation. Parallel connections transmit over only two wires and therefore transmit data mo re slowly. Answer: Parallel connections are subject to clock skew and to crosstalk between wires.

Which three statements are correct about HDLC encapsulation? (Choose three.) HDLC does not support CDP. HDLC and PPP are compatible. HDLC supports PAP and CHAP authentication. HDLC implementation in Cisco routers is proprietary. HDLC uses frame delimiters to mark the beginnings and ends of frames. Answer: HDLC is the default serial interface encapsulation on Cisco routers.

Which three statements are true regarding LCP? (Choose three.) It is responsible for negotiating link establishment. It negotiates options for Layer 3 protocols running over PPP. It uses MD5 encryption while negotiating link establishment parameters. It can test the link to determine if link quality is sufficient to bring up the link. It monitors the link for congestion and dynamically adjusts the acceptable windo w size. Answer: It terminates the link upon user request or the expiration of an inactiv ity timer.

Which two options can LCP negotiate? (Choose two.) dynamic flow control compression and network layer address for IP connection-oriented or connectionless communication methods Answer: authentication; link quality

Which PPP configuration option can be used to establish load balancing over the interfaces of a router? callback compression error detection Answer: multilink

What function do Network Control Protocols provide for a PPP connection? to supply error detection to establish and terminate data links to provide authentication capabilities to PPP to manage network congestion and to allow quality testing of the link Answer: to allow multiple Layer 3 protocols to operate over the same physical li nk

Refer to the exhibit. On the basis of the show interface Serial0/0 output, how m any NCP sessions have been established? one three four Answer: two

11. Refer to the exhibit. Which statement is true about PPP operation? Layer 2 is down. LCP, IPCP, and CDPCP negotiations are in progress. Only the link-establishment phase completed successfully. Answer: Both the link-establishment and network-layer phase completed successful ly.

Which three statements correctly describe PPP authentication? (Choose three.) PAP uses a 3-way handshake to establish a link. PAP provides protection from repeated trial-and-error attacks. CHAP uses a 2-way handshake to establish a link. Answer: CHAP uses repeated challenges for verification. ; CHAP uses a challenge/ response that is based on the MD5 hash algorithm.; PAP sends passwords in clear text.

Which authentication protocol can be spoofed to allow playback attacks? MD5 CHAP NCP Answer: PAP

Refer to the exhibit. What statement is true regarding the output shown? LCP is in the process of negotiating a link. LCP and NCP are waiting for CHAP authentication to complete. LCP negotiation has been successful, but NCP negotiation is in progress. Answer: Data is able to flow across this link.

Refer to the exhibit. What statement is true regarding the output shown? NCP has successfully negotiated. The PAP passwords did not match, so the routers are trying CHAP authentication.

One router can only use PAP authentication while the other router can only use C HAP, so the connection has been rejected. Answer: One router has suggested PAP authentication, and the other has accepted authentication but suggested CHAP authentication.

16. Refer to the exhibit. Which two statements are true regarding the output sho wn? (Choose two.) The router is negotiating IP compression options. The router is requesting an IP address from its peer. The router has accepted IP but not the suggested IP options. Answer: The router has agreed on IP parameters.; The router has negotiated LCP s uccessfully.

What advantage does PPP have over HDLC for serial communications? It can communicate more efficiently with other Cisco devices It is less complex to configure It has less Layer 2 overhead Answer: It supports authentication

At which two layers of the OSI model does a WAN operate? (Choose two.) Network Layer Transport Layer Presentation Layer Application Layer Answer: Physical Layer; Data Link Layer

Which three WAN devices can be found in the cloud? (Choose three.) CSU/DSU Ethernet switches Repeaters Answer: Frame Relay switches; core routers ;ATM switches

Which networking device is typically used to concentrate the dial-in and dial-ou t traffic of multiple users to and from a network? core router Frame Relay switch ATM switch Answer: access server

Which packet-switched WAN technology offers high-bandwidth connectivity capable of managing data, voice, and video all on the same infrastructure? Time Division Multiplexing (TDM) Integrated Services Digital Network (ISDN) Public Switched Telephone Network (PSTN)

Answer: metro Ethernet

Which three features are identified with Frame Relay connections? (Choose three. ) DSLAM SPID 53-byte cells Answer: CIR; DLCI; PVC

Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits? ISDN Frame Relay metro Ethernet Answer: ATM

What are two advantages of an analog PSTN WAN connection? (Choose two.) traffic encryption available bandwidth support for voice and video Answer: low cost; availability

What three terms are associated with ISDN PRI? (Choose three.) cell DLCI packet switching Answer: time-division multiplexing ; data bearer channels ;circuit switching

What can cause a reduction in available bandwidth on a cable broadband connectio n? smaller cells committed information rate distance from the central office of the provider Answer: number of subscribers

What type of connectivity is established when VPNs are used from the remote site to the private network? PVCs DLCIs dedicated Layer 2 links Answer: tunnels

A U.S. company requires a WAN connection used only to transfer sales data from i ndividual stores to the home office. All transfers will occur after business hou rs. The required bandwidth for this connection is estimated to be less than 38 k bps. Which type of connection requires the least investment for this company? ATM ISDN T1 Leased Line Answer: analog dialup

For digital lines, which device is used to establish the communications link bet ween the customer equipment and the local loop? Frame Relay switch ISDN switch modem PBX switch Answer: CSU/DSU

Which term describes a device that will put data on the local loop? DLCI DTE BRI PRI Answer: DCE

2. When Frame Relay encapsulation is used, what feature provides flow control an d exchanges information about the status of virtual circuits? LCP DLCI Inverse ARP Answer: LMI

3.Refer to the exhibit. What is the meaning of the term dynamic in the output of the command? The bandwidth capability of the interface increases and decreases automatically based on BECNs. The mapping between DLCI 100 and 172.16.3.1 was learned through Inverse ARP. DLCI 100 will automatically adapt to changes in the Frame Relay cloud. Answer: The Serial0/0/1 interface acquired 172.16.3.1 from a DHCP server.

4.Refer to the exhibit. Every time the administrator reboots this router, the bo ot process ends in setup mode. What is a possible problem? There is insufficient RAM for the IOS to load on this router. A password recovery process should be done on this router. The bootstrap version and the version of the IOS are different. The IOS image is damaged and must be reloaded using tftpdnld. Answer: The configuration register is set to ignore the startup configuration.

5. Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside n etwork. Host A has sent a packet to the web server. What is the destination IP a ddress of the return packet from the web server? 10.1.1.2:1234 172.30.20.1:1234 192.168.1.2:80 Answer: 172.30.20.1:3333

6. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider? BE DE CBIR Answer: CIR

7. Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP addre ss from the DHCP server. The output of the debug ip dhcp server command shows DHC PD: there is no address pool for 10.1.1.1?. What is the problem? The 10.1.1.1 address is already configured on Fa0/0. The default router for the 10Network pool is incorrect. The ip helper-address must be added to Fa0/0 interface. Answer: The pool of addresses for the 10Network pool is incorrect.

8. Which data link layer encapsulation protocol is used by default for serial co nnections between two Cisco routers? ATM Frame Relay PPP SDLC Answer: HDLC

9. Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5? The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 192.168.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet. The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by the access-list 101 pe rmit ip any any command. It matches the incoming packet to the statement that was created by the access-l ist 201 permit ip any any command and allows the packet into the router. Answer: The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 192.168.1.0 0.0.0.255 command and allows t he packet into the router. Which IEEE 802.16 broadband wireless technology allows users to connect to the I SP at speeds comparable to DSL and cable?

Wi-Fi satellite Metro Ethernet Answer: WiMAX

A network administrator has changed the VLAN configurations on his network switc hes over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet? Interview departmental secretaries and determine if they think load time for web pages has improved. Determine performance on the intranet by monitoring load times of company web pa ges from remote sites. Compare the hit counts on the company web server for the current week to the val ues that were recorded in previous weeks. Answer: Conduct a performance test and compare with the baseline that was establ ished previously. Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination ? extended standard time-based Answer: reflexive

A router does not load its configuration after a power failure. After running th e show startup-configuration command, the adminstrator finds that the original c onfiguration is intact. What is the cause of this problem? The configuration register is set for 02100. The configuration register is set for 02101. The configuration register is set for 02102. Boot system commands are not configured. Flash memory is empty causing the router to bypass the configuration in NVRAM Answer: The configuration register is set for 02142.

16. Refer to the exhibit. A network administrator is trying to connect R1 remotely t o make configuration changes. Based on the exhibited command output, what will b e the result when attempting to connect to R1? failure to connect due to Telnet not being enabled failure to connect due to incomplete configuration for Telnet a successful connection but inability to make configuration changes because of t he absence of an enable secret password Answer: a successful connection and ability to make configuration changes

A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compa red to a shared Frame Relay solution? (Choose two.) reduced jitter reduced costs

reduced latency the ability to burst above guaranteed bandwidth the ability to borrow unused bandwidth from the leased lines of other customers Answer: reduced latency; reduced latency CCNA 2 final Exam New A May 06-2008 1. Refer to the exhibit. What two statements are true based on the output shown? (Choose two.) answer:neighbors 192.168.10.9 and 192.168.10.5 + router 3 is load balancing traffic to the 172.16.3.0 network across its serial 2. Refer to the exhibit. The network administrator issues the command no ip clas sless on Router1. What forwarding action will take place on a packet that is rec eived by Router1 and is destined for host 192.168.0.26? answer: ** The packet will be dropped. 3. The network shown in the diagram is having problems routing traffic. It is su spected that the problem is with the addressing scheme. What is the problem with the addressing used in the topology? answer: ** The subnetwork configured on the serial link between Router1 and Rout er2 overlaps with the subnetwork assigned to Ethernet0 of Router3. 4. Refer to the exhibit. A new PC was deployed in the Sales network. It was give n the host address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not communicating with the network properly. What is the cause? answer: ** 192.168.10.31 is the broadcast address for this subnet. 5. A router has learned about a network through static and dynamic routing proce sses. Which route will be used to reach network 192.168.168.0? answer: ** S 192.168.168.0/24 [1/0] via 192.168.200.1 6. Which three statements are true of holddown timers? (Choose three.) answer: ** prevent update messages from reinstating + allow routers to s till forward packets to ** permit lower metric updates received from any neigh boring router to reinstate the route to a possibly down network 7. Refer to the exhibit. What will happen if interface Serial0/0/1 goes down on Router1? answer: ** DUAL will query neighbors for a route to network 192.168.1.0. 8. When presented with multiple valid routes to a destination, what criteria doe s a router use to determine which routes to add to the routing table? answer: The router first selects routes with the lowest administrative distance. The resulting routes are then prioritized by metric and the routes with the bes t metric are added to the routing table. 9. Using default settings, what is the next step in the router boot sequence aft er the IOS loads from flash? answer: Locate and load the startup-config file from NVRAM. 10. Which three statements are true regarding the encapsulation and de-encapsula tion of packets when traveling through a router? (Choose three. answer: The router modifies the TTL field, decrementing it by one. +++ The rou ter maintains the same source and destination IP. ++++ The router changes the source physical address to the physical address of the exit interface. 11. Which of the following are required when adding a network to the OSPF routin

g process configuration? (Choose three. answer: network address + wildcard mask + area ID 12. What does RIP use to reduce convergence time in a larger network? answer: It uses triggered updates to announce network changes if they happen in between the periodic updates 13. Refer to the exhibit. All routers in the network are running RIPv2 and EIGRP with default routing protocol settings and have interfaces configured with the bandwi dths that are shown in the exhibit. Which protocol will be used and how will traffic betwe en the Router1 LAN and Router5 LAN be routed through the network? answer: EIGRP traffic will use the path Router1, Router3, Router4, Router5 beca use it has the best metric 14. A network administrator has configured a default route on Router_A but it is not being shared with adjacent Router_B and the other routers in the OSPF area. Which command will save the administrator the time and trouble of configuring t his default route on answer: Router_A(config-router)# default-information originate 15. The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing tabl e? answer: S 172.16.1.0 [1/0] via 172.16.2.2 16. Refer to the exhibit. A packet enters Router1 with a destination IP of 172.1 6.28.121. Which routing table entry will be used to forward this packet to the destination address? answer: ** 172.16.16.0/20 [1/0] via 192.168.0.17 17. Refer to the exhibit. What are the effects of the exhibited commands on the router? answer: ** Only the enable password is encrypted. 18. Which two statements are true regarding link-state routing protocols? (Choos e two.) answer: ** They are aware of the complete network topology. + ** They offer rapid convergence times in large networks. 19. Which three statements about routing protocols are true? (Choose three.) answer: ** OSPF elects designated routers on multiaccess links + EIGRP sup ports unequal cost load balancing .+ RIP does not advertise a route beyond a hop count of 15 20. Refer to the exhibit. The network administrator is testing network connectiv ity by issuing the tracert command from host A to host B. Given the exhibited output on host A, what are two possible routing table issues on the network? (Choose two.) answer: ** Router2 is missing a route to the 172.16.0.0 network + ** Router3 i s missing a route to the 10.0.0.0 network 21. What are three features of CDP? (Choose three.) answer: ** tests Layer 2 connectivity ** enabled by default on each interface ** provides information on directly connected devices that have CDP enabled 22. Refer to the exhibit. Routers 1 and 2 are directly connected over a serial l ink. Pings are failing between the two routers. What change by the administrator will correct the problem? answer: ** Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30. 23. What can be determined from the output shown in the exhibit? (Choose two.) answer: ** Montgomery has Layer 2 connectivity with Cumberland. + ** Brant, F isherman, and Potomac are directly connected to Montgomery

24. What command would the network administrator apply to a router that is runni ng OSPF to advertise the entire range of addresses included in 172.16.0.0/19 in are a 0? answer: ** R1(config-router)# network 172.16.0.0 0.0.31.255 area 0 25. What are two tasks that must be completed before two routers can use OSPF to form a neighbor adjacency? (Choose two.) answer: ** The routers must agree on the network type. + ** The routers mus t use the same dead interval. 26. Refer to the exhibit. A network administrator is trying to figure out why BO S does not have the 10.0.0.0/24 network in its routing table. All routers are configured fo r OSPF in area 0. The links between the routers are operational and the administrator is a ble to ping between all router interfaces. What is a logical next step that the network admi nistrator should take to troubleshoot the problem? answer: ** Use show and debug commands to determine if hellos are propagating. 27. Refer to the exhibit. Packets destined to which two networks will require th e router to perform a recursive lookup? (Choose two.) answer: ** 10.0.0.0/8 + ** 192.168.2.0/24 28. Refer to the exhibit. All router interfaces are configured with an IP addres s and are operational. If no routing protocols or static routes are configured, what infor mation will be included in the show ip route command output for router A? answer: ** Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/2 4 will be in the routing table. 29. Refer to the exhibit. The network is running the RIP routing protocol. Netwo rk 10.0.0.0 goes down. Which statement is true regarding how the routers in this to pology will respond to this event? answer: ** Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0. 30. Refer to the exhibit. R1 knows two routes, Path A and Path B, to the Etherne t network attached to R3. R1 learned Path A to network 10.2.0.0/16 from a static route and Path B to network 10.2.0.0/16 from EIGRP. Which route will R1 install in its routing ta ble? answer: ** The route via Path A is installed because the static route has the l owest administrative distance to network 10.2.0.0/16 31. Refer to the exhibit. The ORL router is unable to form a neighbor relationsh ip with the JAX router. What is a possible cause of this problem? answer: ** The command network 192.168.2.0 is missing from the EIGRP configurat ion on the JAX router. 32. Refer to the exhibit. Which statement is true concerning the routing configu

ration? answer: ** Packets routed to the R2 ethernet interface require two routing tabl e lookups. 33. Which of the following should be considered when troubleshooting a problem w ith the establishment of neighbor relationships between OSPF routers? (Choose three. ) answer: ** OSPF interval timers mismatch + ** interface network type mismatch + ** inconsistent authentication configuration

34. Refer to the exhibit. What summary address can Router2 advertise to Router1 to reach the three networks on Routers 3, 4, and 5 without advertising any public a ddress space or overlapping the networks on Router1? answer: ** 172.16.0.0/13 35. A network administrator has enabled RIP on routers B and C in the network di agram. Which of the following commands will prevent RIP updates from being sent to Rout er A? answer: ** B(config)# router rip B(config-router)# passive-interface S0/0 36. Refer to the exhibit. The routers in the exhibit are running the EIGRP routi ng protocol. What statement is true regarding how packets will travel from the 172. 16.1.0/16 network to the 192.168.200.0/24 network? answer: ** The router installs all the equal cost paths in the routing table an d performs equal cost load balancing to send packets out multiple exit interface s. 37. The Suffolk router is directly connected to the networks shown in the graphi c and has a default route that points to the Richmond router. All interfaces are active and properly addressed. However, when the workstation on network 172.29. 5.0/24 sends a packet to destination address 172.29.198.5, it is discarded by th e Suffolk router. What can be a reason for this result? answer: ** The ip classless command is not enabled on the Suffolk router. 38. Refer to the exhibit. The network is using the RIPv2 routing protocol. If ne twork 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising false r outing information back to Router2? answer: ** split horizon 39. What is the purpose of the TTL field within an IP packet header? answer: ** limits the period of time or number of hops a packet can traverse th rough the network before it should be discarded 40. Refer to the exhibit. Which three statements are true of the routing table f or Router1? (Choose three.) answer: ** The AD of EIGRP routes has been manually changed to a value other th an the default value.+ ** Router1 is running both the EIGRP and OSPF + ** No de fault route has been configured. 41. Which three statements describe the operation of routing with EIGRP? (Choose

three.) answer: ** As new neighbors are discovered, entries are placed in a neighbor tab le. + ** If hello packets are not received within the hold time, DUAL must reca lculate the + ** The reported distance is the distance to a destination as adv ertised by a neighbor . 42. Refer to the exhibit. What is the most efficient summarization of the routes attached to router R1? answer: ** 198.18.48.0/21 43. Which of the following could describe the devices labeled ? in the graphic? (Choose three.) answer: ** DCE + ** CSU/DSU + ** modem

44. Refer to the exhibit. How many routes are both level 1 and qualify for use a s an ultimate route? answer: ** 2 45. Refer to exhibit. Given the topology shown in the exhibit, what three comman ds are needed to configure EIGRP on the Paris router? (Choose three.) answer: ** Paris(config)# router eigrp 100 + ** Paris(config-router)# network 192.168.7.0 + ** Paris(config-router)# network 192.168.8.0 46. Which of the following are primary functions of a router? (Choose two.) answer: ** packet switching + ** path selection 47.Refer to exhibit. A company network engineer enters the following commands in the routers: R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2 R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1 When the engineer enters the show ip route command on R1, the routing table does not display the static route to the 10.1.1.0 network. All R1 and R2 interfaces are c orrectly addressed per the graphic. What is a logical next step that the engineer could t ake in order to make the static route display in the routing table in R1? answer: ** Enable the R1 and R2 serial interfaces. 48. Refer to the exhibit. Which path will traffic from the 172.16.1.0/24 network take to get to the 10.0.0.0/24 network? answer: ** It will load balance the traffic between ADC and ABC 49. Which two router component and operation pair are correctly described? (Choo se two.) answer: ** NVRAM - stores the configuration file + ** POST - runs diagnostic s on hardware modules 50. Refer to the exhibit. Pings are failing between HostA and HostB. The network administrator discovers that Router1 does not have a route to the 172.16.0.0 net

work. Assuming Router2 is configured correctly, which two static routes could be confi gured on Router1 to enable Host A to reach network 172.16.0.0? (Choose two.) answer: ** ip route 172.16.0.0 255.255.0.0 S0/0 + ** ip route 172.16.0.0 255 .255.0.0 192.168.0.2 51. When the show cdp neighbors command is issued from Router C, which devices w ill be displayed in the output? answer: ** B, D 52. Refer to the exhibit. The results of the show ip route command are displayed in the graphic for Router R2. Which route will be selected for a packet with a destinat ion address of 10.1.4.1? answer: ** 0.0.0.0/0 via 192.168.0.1 53. Which statement is true regarding routing metrics? answer: ** Routers compare metrics to determine the best route. 54. What is the first step OSPF and IS-IS routers take in building a shortest pa th first database? answer: ** learn about directly connected networks 55. What is the function of the OSPF LSU packet? answer: ** used to announce new OSPF information and to reply to certain types of requests 56. Refer to the exhibit. Hosts on the BOS Fa0/0 LAN are able to ping the Fa0/1 interface on the JAX router and all interfaces on the BOS and ORL routers. Why w ould hosts from the 10.0.0.0/24 network not be able to ping hosts on the Fa0/0 L AN of the JAX router? answer: ** The JAX router needs the network 192.168.3.0 0.0.0.255 area 0 comman d. 57. Refer to the routing table shown in the exhibit. What is the meaning of the highlighted value 192? answer: ** It is the metric, which is cost. 58. Refer to the exhibit. When troubleshooting a network, it is important to int erpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.) answer: ** The missing information for Blank 1 is the command show ip route. + ** The missing information for Blank 2 is the number 120. + ** The missing in formation for Blank 3 is the letter C 1. Refer to the exhibit. The output of the show ip route command for three route rs on a network is displayed. All routers are operational, pings are not blocked on this network, and no default routes are installed. Which two pings will fail ? (Choose two.) from R1 to 172.16.1.1 ** from R1 to 192.168.3.1 from R2 to 192.168.1.1 from R2 to 192.168.3.1 ** from R3 to 192.168.1.1 172.16.4.0/24 answer: ** from R1 to 192.168.3.1 + ** from R3 to 192.168.1.1 2. A router that uses the RIP routing protocol has an entry for a network in the routing table. It then receives an update with another entry for the same destination ne twork but with a lower hop count. What action will the router take for this new update?

** It will append the update information to the routing table. It will invalidate the entry for that network in the routing table. It will replace the existing routing table entry with the new information. It will ignore the new update. answer: ** It will append the update information to the routing table. 3. Which two statements are true for OSPF Hello packets? (Choose two.) They negotiate correct parameters among neighboring interfaces. They are used for dynamic neighbor discovery. They use timers to elect the designated router with the fastest link. ** They are received from all routers on the network and used to determine the c omplete network topology. ** They are used to maintain neighbor relationships answer:** They are received from all routers on the network and used to determin e the complete + ** They are used to maintain neighbor relationships 4. A network administrator needs to configure a single router to loadbalance the traffic over unequal cost paths. Which routing protocol should the administrator use? EIGRP OSPF RIPv1 ** RIPv2 answer: ** RIPv2 5. Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose two.) It is enabled by default on all Cisco IOS implementations. ** It assigns a value that represents an infinite metric to the poisoned route. ** It sends back the poisoned route update to the same interface from where it w as received. It instructs routers to hold all changes that might affect routes, for a specifi ed period of time. It limits the number of hops a packet can traverse through the network before it is discarded. answer: ** It assigns a value that represents an infinite metric to the poisoned route. + ** It sends back the poisoned route update to the same interface fro m where it was 6. Refer to the exhibit. The show cdp neighbors command was run on one of the de vices as shown. Based on this information, which two facts can be determined? (Choose two.) ** The command was run on the router. ABCD is a non CISCO device. Layer 3 connectivity between two devices exists. ABCD supports routing capability. ** ABCD is connected to the Fa0/0 interface of the neighboring device. answer: ** The command was run on the router. + ** ABCD is connected to the Fa0 /0 interface of the neighboring device. 7. Refer to the exhibit. The network has three connected routers: R1, R2 and R3. The

routes of all three routers are displayed. What can be verified from the output? R1 and R3 are connected to each other via the S0/0/0 interface. The IP address of the S0/0/0 interface of R1 is 10.1.1.2. The IP address of the S0/0/1 interface of R2 is 10.3.3.2. ** R2 is connected to the S0/0/1 interface of R3. answer: ** R2 is connected to the S0/0/1 interface of R3. 8. Refer to the exhibit. Which three statements are true of the routing table fo r Router1? (Choose three.) The route to network 172.16.0.0 has an AD of 156160. Network 192.168.0.16 can best be reached using FastEthernet0/0. **The AD of EIGRP routes has been manually changed to a value other than the def ault value. ** Router1 is running both the EIGRP and OSPF routing process. Network 172.17.0.0 can only be reached using a default route. ** No default route has been configured. answer: **The AD of EIGRP routes has + ** Router1 is running both the EIGRP a nd OSPF + ** No default route has been configured. 1CORRECT Frame Relay operates in the _______. A) physical layer B) data link layer C)Answer: physical and data link layers D) None of the choices are correct 2INCORRECT Which ATM layer has a 53-byte cell as an end product? A) physical B) Answer:ATM C) application adaptation D) None of the choices are correct3INCORRECT The IP protocol uses the _______ subla yer. A) AAL1 B) AAL2 C) Answer:AAL5 D) None of the choices are correct4INCORRECT Repeaters function in the _______ laye r. A) Answer:physical B) data link C) network D) None of the choices are correct5CORRECT Bridges function in the _______ layers. A) Answer:physical and data link B) data link and network

C) network and transport D) None of the choices are correct6INCORRECT A bridge has access to the _______ add ress of a station on the same network. A) logical B) Answer:physical C) port D) None of the choices are correct7INCORRECT Routers function in the _______ layers . A) physical and data link B) Answer:physical, data link, and network C) data link and network D) None of the choices are correct8INCORRECT_______ has a higher transmission rate in the downstream direction than in theupstream direction. A) VDSL B) Answer:ADSL C) SDSL None of the choices are correct9INCORRECT_______ is suitable for businesses that require comparable upstream anddownstream data rates. A) VDSL B) ADSL C) Answer:SDSL D) None of the choices are correct10INCORRECT _______ was designed as an alternativ e to the T-1 line. A) VDSL B) ADSL C) Answer:HDSL D) None of the choices are correct11INCORRECT In an ESS the _______ station is mobi le. A) AP B) server C) Answer:BSS D) None of the choices are correct12CORRECT In an ESS the _______ stations are part of a wired LAN. A) Answer:AP

B) server C) BSS D) None of the choices are correct13INCORRECT SONET is a standard for _______ netwo rks. A) twisted-pair cable B) coaxial cable C) Answer:fiber-optic cable D) None of the choices are correct14CORRECT SONET is an acronym for _______ Network . A) Answer:Synchronous Optical B) Standard Optical C) Symmetrical Open D) None of the choices are correct15INCORRECT PPP is a _______ layer protocol. A) physical B) data link C) Answer:physical and data link D) None of the choices are correct ////////////chapte 4//////////////////////////////////////////////////////////// //////// When the Internet started, it was decided to make the network layer a _______ser vice to make it simple. A) connection-oriented B) Answer:connectionless C) virtual D) None of the choices are correct2INCORRECT In a connectionless service, eachWhen the Internet started, it was decided to make the network layer a _______service to make it simple. A) connection-oriented B) connectionless C) virtual D) None of the choices are correct2INCORRECT In a connectionless service, each) source address B) Answer:destination address C) label D)

None of the choices are correct3INCORRECTIn a connection-oriented service, each packet is forwarded based on the________. A) source address B) destination address C) Answer:label D) None of the choices are correct In a _______ service, there is a relation between all packets belonging to amess age. A) connectionless B) virtual C) Answer:connection-oriented D) None of the choices are correct5CORRECTIn _________, the whole packet is sent fr om the source to the destinationwithout being divided into packets. A) Answer:circuit-switching B) packet-switching C) cell-switching D) None of the choices are correct6CORRECTIn _________, the message is first divide d into manageable packets beforebeing sent. A) Answer:circuit-switching B) packet-switching C) cell-switching D) None of the choices are correct7INCORRECT_________ control means including a mec hanism for detecting corrupted, lost,or duplicate packets. A) flow B) Answer:error C) congestion D) None of the choices are correct8CORRECT_________ control means regulating the am ount of data a source can sendwithout overwhelming the destination. A) Answer:flow B) error C) congestion D) None of the choices are correct9INCORRECT______ control in a network means handl ing a situation in which too manypackets are present in an area of the Internet. A) flow B)

error C) Answer:congestion D) None of the choices are correct 10CORRECTA ______ packet is a special packet that can be sent from a router to t he senderwhen the router encounters a congestion. A) Answer:choke B) data C) control D) None of the choices are correct ///////////5///////////////////////////////////////////////////// 1CORRECT An IPv4 address is __________ bits long. A) 16 B) 128 C) Answer:32 D) None of the choices are correct2INCORRECTAn IPv4 address is normally represented in base ____ or dotted-decimalnotation. A) 16 B) Answer:265 C) 10 D) None of the choices are correct3INCORRECTIn classful addressing, the IPv4 addres s space is divided into __________classes. A) 3 B) 4 C) 5 D) Answer:None of the choices are correct4CORRECT In class A, the netid is between ______________ a) Answer:0 to 127 B) 128 to 191 C) 192 to 223 D) None of the choices are correct5CORRECT In class B, the netid is between _______ _______. A) 0 to 127 B) Answer:128 to 191 C) 192 to 223 D)

None of the choices are correct6CORRECT In class C, the netid is between _______ _______. A) 0 to 127 B) 128 to 191 C) Answer:192 to 223 D) None of the choices are correct7CORRECT The default mask for class A is ________ ______. A) 255.255.0.0 B) Answer:255.0.0.0. C) 255.255.255.0 D) None of the choices are correct8CORRECT The default mask for class B is ________ ______. A) Answer:255.255.0.0 B) 255.0.0.0. C) 255.255.255.0 D) None of the choices are correct9CORRECT The default mask for class C is ________ ______. A) 255.255.0.0 B) 255.0.0.0. C) Answer:255.255.255.0 D) None of the choices are correct10INCORRECT The default mask for class D is _____ _________. A) 255.255.0.0 B) 255.0.0.0. C) 255.255.255.0 D) Answer:None of the choices are correct11INCORRECT The default mask for class E i s _____________ A) 255.255.0.0 B) 255.0.0.0. C) 255.255.255.0 D) Answer:None of the choices are correct12INCORRECT In classless addressing, _____ _____ is assigned to a organization. A) Answer:a variable-length block B) a fixed-length

C) a fixed number of blocks D) None of the choices are correct13INCORRECTThe number of addresses assigned to an organization in classless addressing_______. A) can be any number B) must be a multiple of 256 C) Answer:must be a power of 2 D) None of the choices are correct14INCORRECT The first address assigned to an orga nization in classless addressing _______. A) must be a power of 4 B) Answer:must be evenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) None of the choices are correct15CORRECTWhich address could be the beginning add ress of a block of 32 classlessaddresses? A) 2.4.6.5 B) 2.4.6.16 C) Answer:2.4.6.64 D) None of the choices are correct16INCORRECTWhich address could be the beginning a ddress of a block of 16 classlessaddresses? A) 2.4.6.5 B) 2.4.6.15 C) 2.4.6.62 D) Answer:None of the choices are correct17INCORRECTWhich address could be the begi nning address of a block of 256 classlessaddresses? A) 2.4.6.5 B) 2.4.6.15 C) Answer:2.4.6.0 D) None of the choices are correct18CORRECTWhat is the first address of a block of classless addresses if one of the addressesis 12.2.2.76/27? A) 12.2.2.0 B) 12.2.2.32 C) Answer:12.2.2.64 D) None of the choices are correct19INCORRECTWhat is the first address of a block o f classless addresses if one of the addressesis 12.2.2.76/10?

A) Answer:12.0.0.0 B) 12.2.0.0 C) 12.2.2.2 D) None of the choices are correct20INCORRECTWhat is the first address of a block o f classless addresses if one of the addressesis 12.2.2.127/28? A) 12.2.2.0 B) 12.2.2.96 C) Answer:12.2.2.112 D) None of the choices are correct21CORRECTFind the number of addresses in a block of classless addresses if one of theaddresses is 12.2.2.7/24. A) 32 B) 64 C) Answer:256 D) None of the choices are correct22INCORRECTFind the number of addresses in a bloc k of classless addresses if one of theaddresses is 12.2.2.7/30. A) 2 B) Answer:4 C) 8 D) None of the choices are correct23INCORRECTWhat is the last address of a block of classless addresses if one of the addressesis 12.2.2.127/28? A) 12.2.2.16 B) 12.2.2.112 C) Answer:12.2.2.127 D) None of the choices are correct24INCORRECTWhat is the last address of a block of classless addresses if one of the addressesis 12.2.2.6/30? A) 12.2.2.2 B) 12.2.2.6 C) Answer:12.2.2.7 D) None of the choices are correct25CORRECT In fixed-length subnetting, the number of subnets must _______. A) Answer:be a power of 2 B) be a multiple of 128 C) be divisible by 128

D) None of the choices are correct26INCORRECTAn organization is granted a block; on e address is 2.2.2.64/20. Theorganization needs 10 subnets. What is the subnet p refix length? A) /20 B) /24 C) Answer:/25 D) None of the choices are correct27INCORRECTAn organization is granted a block; on e address is 2.2.2.64/25. If the subnetprefix length is /28, what is the maximum number of subnets? A) 2 B) 4 C) Answer:8 D) None of the choices are correct28INCORRECTAn organization is granted a block of classless addresses with the startingaddress 199.34.76.64/28. How many addresses are granted? A) 8 B) Answer:16 C) 32 D) None of the choices are correct29CORRECTAn organization is granted a block of cl assless addresses with the startingaddress 199.34.76.128/29. How many addresses are granted? A) Answer:8 B) 16 C) 32 D) None of the choices are correct30INCORRECTAn organization is granted a block of classless addresses with the startingaddress 199.34.32.0/27. How many addresses are granted? A) 8 B) 16 C) Answer:32 D) None of the choices are correct31INCORRECT What is the default mask for class A in CIDR notation? A) /9 B) Answer:/8 C) /16 D)

None of the choices are correct32INCORRECT What is the default mask for class B in CIDR notation? A) /9 B) /8 C) Answer:/16 D) None of the choices are correct33CORRECT What is the default mask for class C in CIDR notation? A) Answer:/24 B) /8 C) /16 D) None of the choices are correct34INCORRECTIn ________ addressing, when an addres s is given, we can find the beginningaddress and the range of addresses. A) classless B) Answer:classful C) both classless and classful D) None of the choices are correct35INCORRECTIn classless addressing, the ______ is another name for the common part of theaddress range. A) suffix B) Answer:prefix C) netid D) None of the choices are correct In classless addressing, the _______ is the varying part (similar to the hostid) . A) Answer:suffix B) prefix C) hostid D) None of the choices are correct37INCORRECT In classless addressing, the prefix l ength defines the _____________. A) netid B) hostid C) Answer:mask D) None of the choices are correct38INCORRECT In a block, the prefix length is /22; what is the mask? A) 255.255.255.0 B)

Answer:255.255.252.0 C) 255.255.0.0 D) None of the choices are correct39CORRECT In a block, the prefix length is /15; w hat is the mask? A) Answer:255.254.0.0 B) 255.255.255.0 C) 255.255.255.128 D) None of the choices are correct40INCORRECT In a block, the mask is 255.255.192.0 ; what is the prefix length? A) /20 B) /28 C) Answer:/18 D) None of the choices are correct41INCORRECT In a block, the mask is 255.255.255.2 24; what is the prefix length? A) /20 B) /19 C) /20 D) Answer:None of the choices are correc //////////////////6///////////////////////////////////////////////////////////// /////// In _______ delivery, both the deliverer of the IP packet and the destination are on the same network. A) a connectionless B) Answer:a direct C) an indirect D) None of the choices are correct2INCORRECTIn _______ delivery, the deliverer of t he IP packet and the destination are ondifferent networks. A) a connection-oriented B) a direct C) Answer:an indirect D) None of the choices are correct3INCORRECTIn classful addressing, when a direct d elivery is made, both the deliverer andreceiver have the same _______. A) IP address B) hostid C) Answer:netid

D) None of the choices are correct4INCORRECTIn classful addressing, when an indirec t delivery is made, the deliverer andreceiver have _______. A) the same IP address B) Answer:different netids C) the same netid D) None of the choices are correct5INCORRECTIn _______ forwarding, the full IP addr ess of a destination is given in therouting table. A) next-hop B) network-specific C) Answer:host-specific D) default6INCORRECTIn _______ forwarding, the mask and destination addresses are b oth 0.0.0.0 inthe routing table. A) next-hop B) network-specific C) host-specific D) Answer:default7INCORRECTIn _______ forwarding, the destination address is a netw ork address in therouting table. A) next-hop B) Answer:network-specific C) host-specific D) default8CORRECTIn _______ forwarding, the routing table holds the address of jus t the next hopinstead of complete route information. A) Answer:next-hop B) network-specific C) host-specific D) default9CORRECTIn ________ addressing, a typical forwarding module can be design ed usingthree tables, one for each unicast class (A, B, C). A) Answer:classful B) classless C) classful and classless D) None of the choices are correct10INCORRECTIn classful addressing, the class of t he address can be found by shifting thecopy of the address ____ bits to the righ t. A) 32

B) 16 C) Answer:28 D) None of the choices are correct11CORRECT In classful addressing we need a routin g table with at least ______ columns. A) 4 B) Answer:3 C) 8 D) None of the choices are correct12CORRECT In classless addressing, we need a rout ing table with at least _______ columns. A) Answer:4 B) 3 C) 8 D) None of the choices are correct13INCORRECTThe idea of address aggregation was de signed to alleviate the increase inrouting table entries when using ________. A) classful addressing B) Answer:classless addressing C) classful addressing and classless addressing D) None of the choices are correct14CORRECTThe principle of ________ states that th e routing table is sorted from thelongest mask to the shortest mask. A) first mask matching B) shortest mask matching C) Answer:longest mask matching D) None of the choices are correct15INCORRECTThe use of hierarchy in routing tables can ________ the size of the routingtables. A) Answer:reduce B) increase C) reduce and increase D) None of the choices are correct16INCORRECT _______ deals with the issues of crea ting and maintaining routing tables. A) Forwarding B) Answer:Routing C) Directing D) None of the choices are correct17INCORRECT A _______ routing table contains info

rmation entered manually. A) Answer:static B) dynamic C) hierarchical D) None of the choices are correct A _______ routing table is updated periodically using one of the dynamicrouting protocols. A) static B) Answer:dynamic C) hierarchical D) None of the choices are correct19CORRECTThe input and output ports of a router p erform the ________ layer functions of the router. A) Answer:physical and data link B) network C) transport D) None of the choices are correct20INCORRECTThe routing processor of a router perf orms the ________ layer functions of therouter. A) physical and data link B) Answer:network C) transport D) None of the choices are correct21INCORRECTThe task of moving the packet from the input queue to the output queue in arouter is done by _________. A) input and output ports B) routing processor C) Answer:switching fabrics D) None of the choices are correct ////////////////CHAPTER-7 1INCORRECTThe ________ protocol is the transmission mechanism used by the TCP/IP suite. A) ARP B) Answer:IP C) RARP D) None of the choices are correct2INCORRECT IP is _________ datagram protocol.

A) unreliable B) connectionless C) Answer:both unreliable and connectionless D) None of the choices are correct3INCORRECTThe term ________ means that IP provide s no error checking or tracking. IPassumes the unreliability of the underlying l ayers and does its best to get atransmission through to its destination, but wit h no guarantees. A) reliable delivery B) connection-oriented delivery C) Answer:best-effort delivery D) None of the choices are correct4INCORRECT A best-effort delivery service such as IP includes _______. A) error checking B) error correction C) datagram acknowledgment D) Answer:None of the choices are correct5INCORRECT An HLEN value of decimal 10 mea ns _______. A) there are 10 bytes of options B) there are 40 bytes of options C) Answer:there are 40 bytes in the header D) None of the choices are correct6INCORRECT If the fragment offset has a value of 100, it means that _______. A) the datagram has not been fragmented B) the datagram is 100 bytes in size C) Answer:the first byte of the datagram is byte 800 D) None of the choices are correct7INCORRECT What is needed to determine the number of the last byte of a fragment? A) offset number B) total length C) Answer:both offset number and the total length D) None of the choices are correct8CORRECT The IP header size _______. A) Answer:is 20 to 60 bytes long B) is 20 bytes long

C) is 60 bytes long D) None of the choices are correct9INCORRECT Packets in the IP layer are called ___ ______. A) segments B) Answer:datagrams C) frames D) None of the choices are correct10CORRECT The total length field defines the tota l length of the datagram _________. A) Answer:including the header B) excluding the header C) header and option length D) None of the choices are correct11INCORRECTWhen a datagram is encapsulated in a f rame, the total size of the datagram mustbe less than the _______. A) MUT B) MAT C) Answer:MTU D) None of the choices are correct12INCORRECTWhich IP option is used if exactly fou r specific routers are to be visited by thedatagram? A) record route B) Answer:strict source route C) loose source route D) None of the choices are correct13CORRECTFor the timestamp option, a flag value o f _______ means that each visitedrouter adds only the timestamp in the provided field. A) Answer:0 B) 1 C) 2 D) None of the choices are correct14INCORRECTThe IP header field formerly known as the service type field is now called the_______ field. A) IETF B) checksum C) Answer:differentiated services D) None of the choices are correct15INCORRECTThe _______ module takes fragments of

a message and puts them back inorder. A) processing B) fragmentation C) Answer:reassembly D) None of the choices are correct16INCORRECTThe _______ module sends out an IP pac ket, the next-hop address, andinterface information. A) processing B) Answer:forwarding C) fragmentation D) None of the choices are correct17CORRECT The _______ module discards datagrams w ith a TTL value of zero. A) Answer:processing B) forwarding C) fragmentation D) None of the choices are correct18INCORRECTThe output of the _______ module is an IP packet destined for an upper-layerprotocol. A) processing B) forwarding C) Answer:reassembly D) None of the choices are correct19INCORRECTThe _______ module consults the MTU ta ble to determine the packet sizenecessary for transmission. A) processing B) forwarding C) Answer:fragmentation D) None of the choices are correct20CORRECTThe value of the ________ subfield in an option controls the presence of theoption in fragmentation. A) Answer:copy B) class C) number D) None of the choices are correct21INCORRECT The value of the ________ subfield de fines the general purpose of an option. A) copy B) Answer:class

C) number D) None of the choices are correct22INCORRECT The value of the ________ subfield de fines the types of an option. A) copy B) class C) Answer:number D) None of the choices are correct23INCORRECT Only ______ end of option option can be used in a datagram. A) two B) three C) Answer:one D) None of the choices are correct24CORRECTWhen we use IP over ATM, only the ______ __ cell carry(ies) the 8-byte traileradded to the IP datagram. A) Answer:last B) first C) last and first D) None of the choices are correct 25INCORRECTWhen we use IP over ATM, padding can be added only to the _____ or th e_______. A) first cell; last cell B) last two cells; last three cells C) Answer:last cell; last two cells D) None of the choices are correct26INCORRECTTo find the physical address of the ex iting-point router, ATM uses the servicesof _________. A) ARP B) IP C) Answer:ATMARP D) None of the choices are correct27INCORRECTThe inverse request and inverse reply messages can bind the physical address toan IP address in a(n) _______ situation . A) SVC B) Answer:PVC C) SVC and PVC D)

None of the choices are correct28CORRECTThe request and reply message can be use d to bind a physical address to an IPaddress in a(n) _______ situation. A) Answer:SVC B) PVC C) SVC and PVC D) None of the choices are correct29INCORRECT __________ allows an ATM network to b e divided into several logical subnets. A) LAS B) LAN C) Answer:LIS D) None of the choices are correct CHPATER-8Results Reporter 1INCORRECT A _______ address is an internetwork address with universal jurisdic tion. A) physical B) Answer:logical C) port D) None of the choices are correct2INCORRECTThe logical addresses in the TCP/IP pro tocol suite are called _______addresses. A) port B) Answer:IP C) Email D) None of the choices are correct3INCORRECT A ________ is a local address. Its jur isdiction is over a local network. A) Answer:physical B) logical C) port D) None of the choices are correct4INCORRECTIf the sender is a host and wants to se nd a packet to another host on the samenetwork, the logical address that must be mapped to a physical address is______. A) Answer:the destination IP address in the datagram header B) the IP address of the router found in the routing table C) the source IP address D) None of the choices are correct5INCORRECTIf the sender is a host and wants to se nd a packet to another host on anothernetwork, the logical address that must be mapped to a physical address is______.

A) the destination IP address in the datagram header B) Answer:the IP address of the router found in the routing table C) the source IP address D) None of the choices are correct 6INCORRECTThe sender is a router that has received a datagram destined for a hos t onanother network. The logical address that must be mapped to a physical addre ssis ______. A) the destination IP address in the datagram header B) Answer:the IP address of the router found in the routing table C) the source IP address D) None of the choices are correct7INCORRECTThe sender is a router that has receive d a datagram destined for a host in thesame network. The logical address that mu st be mapped to a physical address is______. A) Answer:the destination IP address in the datagram header B) the IP address of the router found in the routing table C) source IP address D) None of the choices are correct8INCORRECTIn _______, a table associating a logic al address with a physical address isupdated manually. A) Answer:static mapping B) dynamic mapping C) physical mapping D) None of the choices are correct9INCORRECT The target hardware address on an Ethe rnet is _______ in an ARP request. A) Answer:0x000000000000 B) 0.0.0.0 C) variable D) class dependent10INCORRECT An ARP reply is normally _______. A) broadcast B) multicast C) Answer:unicast D) None of the choices are correct11INCORRECT An ARP request is normally _______. A) Answer:broadcast B) multicast

C) unicast D) None of the choices are correct 12INCORRECT A technique called ______ is used to create a subnetting effect. A) ARP B) RARP C) Answer:proxy ARP D) None of the choices are correct13INCORRECT A _______ is an ARP that acts on beha lf of a set of hosts. A) ARP B) RARP C) Answer:proxy ARP D) None of the choices are correct CHAPTER-9Results Reporter .1CORRECT ICMP is a _________ layer protocol. A) data link B) Answer:transport C) network D) None of the choices are correct2CORRECT An ICMP message has _____ header and a v ariable-size data section. A) a 16-byte B) a 32-byte C) Answer:an 8-byte D) None of the choices are correct3INCORRECT Which of the following is true about I CMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated for eachfragment. C) An ICMP error message may be generated for a multicastdatagram. D) Answer:none is true4INCORRECT Which of the following is true about ICMP messages ? A) An ICMP error message may be generated for an ICMPerror message. B) Answer:An ICMP error message may be generated only for the firstfragment. C) An ICMP error message may be generated for a multicastdatagram.

D) none is true5CORRECT Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMPerror message. B) An ICMP error message may be generated only for eachfragment. C) Answer:No ICMP error message will be generated for a datagramhaving a special ad dress such as 127.0.0.0 or 0.0.0.0. D) none is true6INCORRECTIf a host needs to synchronize its clock with another host , it sends a_______ message. A) Answer:timestamp-request B) source-quench C) router-advertisement D) None of the choices are correct7INCORRECT The purpose of echo request and echo r eply is to _______. A) report errors B) Answer:check node-to-node communication C) check packet lifetime D) None of the choices are correct8INCORRECT In error reporting the encapsulated IC MP packet goes to _______. A) Answer:the original sender B) the receiver C) a router D) None of the choices are correct9INCORRECTWhat field uniquely identifies the kind of ICMP message (forexample, echo reply versus echo request)? A) Answer:type B) code C) option ID D) None of the choices are correct10INCORRECTWhen the hop-count field reaches zero and the destination has notbeen reached, a _______ error message is sent. A) destination-unreachable B) Answer:time-exceeded C) parameter-problem D) None of the choices are correct11INCORRECTWhen all fragments of a message have n ot been received within thedesignated amount of time, a _______ error message is sent. A)

source-quench B) Answer:time-exceeded C) parameter-problem D) None of the choices are correct12INCORRECTErrors in the header or option fields of an IP datagram require a_______ error message. A) Answer:parameter-problem B) source-quench C) router-solicitation D) None of the choices are correct13CORRECTA _______ can learn about network ______ _ by sending out a router-solicitation packet. A) router, routers B) router, hosts C) Answer:host, routers D) None of the choices are correct14CORRECT Who can send ICMP error-reporting messa ges? A) routers B) destination hosts C) Answer:routers or destination hosts D) None of the choices are correct 15CORRECTOne method to alert a source host of congestion is the _______message. A) redirection B) echo-request C) Answer:source-quench D) None of the choices are correct16CORRECT A time-exceeded message is generated if _______. A) the round-trip time between hosts is close to zero B) fragments of a message do not arrive within a set time C) Answer:the round-trip time between hosts is close to zero andfragments of a mess age do not arrive within a set time D) None of the choices are correct17INCORRECTTo determine whether or not a node is reachable, _______ messagecan be sent. A) an echo-reply B) Answer:an echo-request C)

a redirection D) None of the choices are correct18CORRECTIn calculating the time difference betwe en two clocks, a negativevalue indicates _______. A) an invalid calculation B) the source clock lags behind the destination clock C) Answer:the destination clock lags behind the source clock D) None of the choices are correct19INCORRECTAn IP datagram (datagram A) cannot rea ch its destination. An ICMPerror message is sent to the source. The data field o f the IP datagram(datagram B) that encapsulates the ICMP packet contains _______ . A) only the ICMP header B) Answer:the ICMP header plus 8 bytes of datagram A C) only datagram A D) None of the choices are correct 1. CCNAExploration1Chapter5ExamAnswers thumb CCNA Exploration 1 Chapter 5 Exam Answ ers Refer to the exhibit. Using the network in the exhibit, what would be the defaul t gateway address for host A in the 192.133.219.0 network? 192.135.250.1 192.31.7.1 192.133.219.0 192.133.219.1 answer: 192.133.219.1 2. What two characteristics are commonly associated with dynamic routing protoco ls? (Choose two.) require no device configuration provide routers with up-to-date routing tables require less processing power than static routes require consume bandwidth to exchange route information prevent manual configuration and maintenance of the routing table answer: provide routers with up-to-date routing tables + consume bandwidt h to exchange route information

3. What are the key factors to consider when grouping hosts into a common networ k? (Choose three.) gateways

purpose physical addressing software version geographic location ownership answer: purpose + geographic location + ownership

4. What statement describes the purpose of a default route? A host uses a default route to transfer data to another host on the same network segment. A host uses a default route to forward data to the local switch as the next hop to all destinations. A host uses a default route to identify the Layer 2 address of an end device on the local network. A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists. answer: A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists. 5. In an IPv4 environment, what information is used by the router to forward dat a packets from one interface of a router to another? destination network address source network address source MAC address well known port destination address answer: destination network address 6. What type of routing uses information that is manually entered into the routi ng table? dynamic interior static standard answer: static 7. In a connectionless system, which of the following is correct? The destination is contacted before a packet is sent. The destination is not contacted before a packet is sent.

The destination sends an acknowledgement to the source that indicates the packet was received. The destination sends an acknowledgement to the source that requests the next pa cket to be sent. answer: The destination is not contacted before a packet is sent. 8. What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number source and destination IP address answer: source and destination IP address 9. If the default gateway is configured incorrectly on the host, what is the imp act on communications? The host is unable to communicate on the local network. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. The host can communicate with other hosts on remote networks, but is unable to c ommunicate with hosts on the local network. There is no impact on communications. answer: The host can communicate with other hosts on the local network, but is u nable to communicate with hosts on remote networks. 10. CCNAExploration1Module5ExamAnswers thumb CCNA Exploration 1 Chapter 5 Exam Answe rs Refer to the exhibit. A network administrator notices that there are too many br oadcasts on the network. What two steps can the network administrator take to re solve this problem? (Choose two.) Replace S2 with a router. Place all servers on S1. Disable TCP/IP broadcasts. Subnet the 192.168.0.0 /24 network. Disable all unused interfaces on the switches. answer: Replace S2 with a router. + Subnet the 192.168.0.0 /24 network. 11. CCNAExploration1ExamAnswers thumb1 CCNA Exploration 1 Chapter 5 Exam Answers Refer to the exhibit. All devices shown in the exhibit have factory default sett

ings. How many broadcast domains are represented in the topology that is shown? 3 4 5 7 8 11 answer: 4 12. What is a component of a routing table entry? the MAC address of the interface of the router the destination Layer 4 port number the destination host address the next-hop address answer: the next-hop address 13. Which IP packet field will prevent endless loops? type-of-service identification flags time-to-live header checksum answer:time-to-live 14. What is the purpose of a default gateway? physically connects a computer to a network provides a permanent address to a computer identifies the network to which a computer is connected identifies the logical address of a networked computer and uniquely identifies i t to the rest of the network identifies the device that allows local network computers to communicate with de vices on other networks answer: identifies the device that allows local network computers to communicate with devices on other networks 15. Which intermediary devices could be used to implement security between netwo

rks? (Choose two.) router hub switch firewall access point bridge answer: router + firewall 16. CCNA1ExamAnswers thumb2 CCNA Exploration 1 Chapter 5 Exam Answers Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choos e two.) 192.168.0.2 is the next-hop address that is used by R3 to route a packet from th e 10.0.0.0 network to the 172.16.0.0 network. 10.0.0.1 is the next-hop address that is used by R1 to route a packet from the 1 92.168.12.0 network to the 10.0.0.0 network. 192.168.0.1 is the next-hop address that is used by R1 to route a packet from th e 192.168.12.0 network to the 172.16.0.0 network. 172.16.0.1 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 to the 172.16.0.0 network. 192.168.0.1 is the next-hop address that is used by R2 to route a packet from th e 172.16.0.0 network to the 192.168.12.0 network. 192.168.0.2 is the next-hop address that is used by R2 to route a packet from th e 172.16.0.0 network to the 192.168.12.0 network. answer: 192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network. + 192.168.0.1 is t he next-hop address that is used by R2 to route a packet from the 172.16.0.0 net work to the 192.168.12.0 network. 17. CCNA1Answers thumb2 CCNA Exploration 1 Chapter 5 Exam Answers Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packe ts out the network. Using the netstat -r command, the administrator would identi fy which address as the address to which all hosts send packets that are destine d for an outside network? 10.10.10.26 127.0.0.1 10.10.10.6 10.10.10.1

224.0.0.0 answer: 10.10.10.6 18. Which portion of the network layer address does a router use to forward pack ets? host portion broadcast address network portion gateway address answer: network portion 19. When the destination network is not listed in the routing table of a Cisco r outer, what are two possible actions that the router might take? (Choose two.) The router sends an ARP request to determine the required next hop address. The router discards the packet. The router forwards the packet toward the next hop indicated in the ARP table. The router forwards the packet to the interface indicated by the source address. The router forwards the packet out the interface indicated by the default route entry. answer: The router discards the packet. + The router forwards the pack et out the interface indicated by the default route entry. 20. Which three statements are true about routes and their use? (Choose three.) If no route to the destination network is found, the packet is returned to the p revious router. If the destination network is directly connected, the router forwards the packet to the destination host. If multiple network entries exist for the destination network, the most general route is used to forward the packet. If no route exists for the destination network and a default route is present, t he packet is forwarded to the next-hop router. If the originating host has a default gateway configured, the packet for a remot e network can be forwarded using that route. If a host does not have a route manually configured for the destination network, the host will drop the packet. answer: If the destination network + If no route exists for the destination n etwork + If the originating host has a default gateway configured, 21. What are three common problems with a large network? (Choose three.)

too few broadcasts performance degradation security issues limited management responsibility host identification protocol compatibility answer: performance degradation + security issues + host identifica tion Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number Which best describes the function of the Physical Layer? answer: Provides electrical, mechanical, procedural and functional means for act ivating and maintaining links between systems. What best describes the functions of the Application Layer? answer: Defines end-to-end delivery of packets What happens after a collision has occurred on a network after the jam signal is sent? answer: All stations stop sending frames for a randomly selected time period Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? answer: Ethernet switch Why has a layered network model been developed? answer: Accelerates evolution, ensures interoperable technology and facilitates modular engineering. Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? answer: Windowing If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? answer: 14 During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? answer: Acknowledgement and retransmission Which Layer of the OSI model is concerned with the topology of a network? answer: Data Link Which network device provides internetworking and broadcast control? answer: Router

Where is the Layer 2 address found on a workstation? answer: On the network interface card What are the most common LAN technologies used in networking today? answer: Ethernet, token ring, FDDI Which of the following is true about a CSMA/CD network? answer: One node's transmission traverses the entire network and is seen and che cked by every node. Which Layer of the OSI model provides data representation and code formatting? answer: Presentation Layer What correctly describes the five conversion steps of data encapsulation? answer: Data-segments-packets-frames-bits Which OSI Layer determines best path selection? answer: Network Layer Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? answer: There will be no response. Which Layer of the OSI model handles data encryption? answer: Presentation Routers make forwarding decisions based on which kind of address? answer: logical Which Cisco IOS command is used to enter privileged mode? answer: enable What is the default user-mode prompt for a Cisco router? answer: Router> What do WAN Data link protocols describe? answer: How frames are carried between systems What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? answer: It indicates the location of an error in a command string What best describes Frame Relay? answer: Uses high quality digital facilities with no error correction Which layers of the OSI model do WAN standards describe? answer: Physical and data link Which is an example of a data circuit terminating equipment (DCE)? answer: Modem What is the prompt of a Cisco router in the priviledged mode? answer: Router# Which packet-switched service is more efficent than X.25? answer: Frame Relay If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? answer: B. ? What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? answer: The spacebar Which memory component of a router loses its content when the router is turned o ff? answer: RAM What can only be done in privileged mode on Cisco routers? answer: Change the configuration Which character is used to enter the help mode? answer: ? Which protocol does a WAN use to make path determination decisions? answer: IP Which WAN protocol supports point-to-point and multipoint configurations? answer: HDLC Which of the following WAN technologies is a Circuit-Switched Service? answer: Narrowband ISDN Which of the following WAN technologies is a Cell-Switched Service? answer: Asynchronous Transfer Mode

Which of the following are stored in NVRAM? answer: Configuration Files What do the WAN Physical Layer standards describe? answer: Interface between DTE and DCE Which keystroke will recall the previous command entry on a Cisco router user in terface? answer: Up arrow Which service does a WAN provide to LANs? answer: Exchange of data packets between routers and the LANs they support In which Layer of the OSI Model do WAN routers operate? answer: Network Layer When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? answer: User mode Which Cisco IOS command shows the configuration file stored in NVRAM? answer: show startup-config Which external configuration source is used with a modem? answer: Auxiliary Port The show interface serial Cisco IOS router command can display which one of the following lines of information? answer: Serial1 is up, line protocol is up. Which router component stores configuration files even when power is off? answer: NVRAM What is the router prompt for the interface configuration mode? answer: Router(config-if)# Which protocol is used to show summary configuration information about a directl y connected Cisco router? answer: Cisco Discovery Protocol Which Cisco IOS command is used to show current telnet connections? answer: show sessions What is the correct command to go from the user EXEC mode to the privileged EXEC mode? answer: enable Which Cisco IOS command displays routing table entries? answer: show ip route What is stored in working RAM and is constantly updated when the router is worki ng properly? answer: Routing Table When is the configuration file loaded into RAM? answer: Each time the router is initialized Which command will indicate the status of IP, IPX, and AppleTalk? answer: show protocols What is the first thing the router does when power is turned on? answer: Executes a bootstrap program Which port is used to initially configure a router? answer: Console Which response to the appropriate show command indicates an operational serial l ink? answer: Serial1 is up, line protocol is up Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? answer: RXBOOT How many Telnet sessions can a Cisco router have simultaneously? answer: 5 Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? answer: show startup-config Which router component provides working memory for configuration files and routi ng tables? answer: RAM

Which command shows the status of Ethernet, Serial, BRI, and other ports? answer: show interfaces Which router component is responsible for the power-on bootstrap sequence? answer: ROM Which command displays information about the current Cisco IOS software version running on a router? answer: show version In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? answer: Layer 2 Which Cisco IOS command displays the backup configuration file stored in NVRAM? answer: Router# show startup-config While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? answer: square brackets - example [yes] What is the first global configuration parameter set when using the setup mode? answer: host name of the router What is the function of the erase startup-config command? answer: It deletes the configuration file in NVRAM You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? answer: copy running-config startup-config Which command will save an active configuration? answer: copy running-config startup-config How does the router prompt appear when you are in global configuration mode? answer: Router(config)# Where is the next place a router looks if it cannot find the IOS image in flash? answer: TFTP What is the function of the reload command? answer: It reboots the router Which of the following is the correct order in which a router boots and looks fo r files? answer: 1,5,7,6,2,4,3 When setting passwords for vty 0 4, what are you setting a password for? answer: Telnet sessions What is an important function of the power-up self test (POST)? answer: Executes diagnostics that verify the basic operation of router hardware Which password is encrypted in the configuration file by default? answer: Enable secret Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is an important result of the configuration file loading onto a router? answer: Starts routing processes, supplies addresses for interfaces, and sets up media characteristics Where is the configuration file saved when you complete the setup process? answer: NVRAM Once you have selected an interface to configure, which prompt would be on the s creen? answer: Router(config-if)# You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? answer: banner motd Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C Which command is used to copy a system image to a network server? answer: Router# copy flash tftp Which configuration register mode is used to tell the router to boot answer: 0x---1

Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename Which command can be used to check the amount of system memory available? answer: Router# show flash In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets Which type of addressing scheme is formed by MAC addresses? Answer: @A. flat Which address(es) appear in an IP packet's header? Answer: source and destination addresses Which of the following is a benefit of network segmentation? Answer: reduced congestion Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer: 205.255.170.205 Which octet(s) are assigned locally in a class B address? Answer: The third and fourth octets are assigned locally What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? Answer: 6 What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? Answer: subnets Which class of network addresses allows the borrowing of 15 bits to create subne ts? Answer: Class A Which part of a network layer address does the router use during path determinat ion? Answer: the network address Which of the following represents the use of binary ones in a subnet mask? Answer: subnet and network bits How large is the network/subnet portion of a Class B license having a subnet mas k of 255.255.240.0? Answer: 20 bits How many bits are in an IP address? Answer: 32 How many total subnets can be created if four bits are borrowed from the host fi eld? Answer: 16 What is specified by the network number in an IP address? Answer: the network to which the host belongs Which of the following assists devices on the same network in determining a pack et's final destination? Answer: host ID Which of the following would be the largest possible number expressed by an 8 bi t binary number? Answer: 11111111 Which of the following best describes the address 139.219.255.255 in an unsubnet ted environment? Answer: Class B broadcast address The IP address for a router interface should be part of what? Answer: the network attached to the interface When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? Answer: IP address of the destination host What is the correct term for when routes are learned automatically? Answer: dynamic routing What do bridges and switches use to make data forwarding decisions? Answer: physical addresses Which is an example of a Layer 3 internetworking device that passes data packets

between networks? Answer: router Which type of routing protocol is RIP? Answer: distance vector Router ARP tables hold information from which of the following? Answer: all networks connected to them What is the most common protocol used to transfer routing information between ro uters located on the same network? Answer: RIP In a connection-oriented system, what happens before any user data is transferre d? Answer: a connection is established between the sender and receiver What happens if a data packet reaches a router that is destined for a network wi th which that router is not directly connected? Answer: The router forwards the packet to another router that most likely contai ns information about the destination. Which of the following contains a unique network number that is used in routing? Answer: IP address Which protocol is used to dynamically assign IP addresses? Answer: DHCP Connection-oriented network processes are often referred to as what? Answer: circuit switched Which describes the changes made to a packet's IP destination address, as that p acket is passed from router to router on it's way to the destination host? Answer: The destination IP address never changes. Which protocol can find the MAC address of a computer given its IP address? Answer: ARP Why is a static route the preferred method for reaching stub networks? Answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer: proxy ARP Which is an example of a routed protocol? Answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? Answer: transport What do routers use to exchange routing tables and share route information? Answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? Answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? Answer: IGRP In a connectionless system, which of the following is correct? Answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? Answer: IP What are the two proprietary routing protocols developed by Cisco? Answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? Answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer: the domain The Telnet application works mainly at which layers of the OSI model? Answer: application, presentation, and session Which application layer protocol supports e-mail programs? Answer: POP3 What is the language used to create web pages? Answer: HTML

What is an example of an application that requires both a client and server comp onent in order to function? Answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? Answer: IP address Which protocol is designed to download or upload files on the Internet? Answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? Answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? Answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? Answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? Answer: DNS E-mail addresses consist of which two parts? Answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? Answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? Answer: hyperlink What is the data-link destination address of a broadcast message? Answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? Answer: All devices look at the request and ONLY host B will reply with the MAC address Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? Answer: Session Which best describes the structure of a MAC address? Answer: 24 bit vendor code plus 24 bit serial number

3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical 8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask

8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64 8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless 8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two 8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r.

answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process. answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem? answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data.

answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides? answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer . answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080 8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol 8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal? answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes

answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true? answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch? answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks 8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer? answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar

e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain 8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation 8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers? answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN? answer: a. The source device encapsulates data in a frame with the MAC addre ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______ answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI?

answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps 8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm 8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer? answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets? answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename

6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting? answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 5.9.ARP stands for __________ Answer: A. Address Resolution Protocol 5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others

4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte 14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization 17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record. alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp

ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address? Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are..

Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout

Answer:

*A.

Slow start

If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP

Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star 5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security 11. Which topology requires a multipoint connection? answer (d): Bus 12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical

18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added 20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer? Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport 28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero 31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time

36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________. Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise 49. A sine wave is ________. Answer: d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation

53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise 55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line 63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude?

Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI 73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation. Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude 84. Which of the following is most affected by noise? Answer: d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases

89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal.

Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM 119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM 120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications.

Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial 125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light 129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables 133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than 136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index

140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical 143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch? Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair

158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______. Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end

175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6 182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL 185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data 187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this?

Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder 195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded 205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error? Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are

210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___

____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation 249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______. Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F

259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP 278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer.

Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame. Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC) 299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID.

Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical 311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing. Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit. Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station . Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the 332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium

336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b) 340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length. Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches. Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen

362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine 366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above

386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______. Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c) 403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a

way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP 423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? Answer: c. n 1 425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing 427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence?

Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB 451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______. Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas

t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited 461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket 473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs.

Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port 486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______. Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO

497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP 503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. Answer: c. Scalability 506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper 507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate. 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above

511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio 513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error. Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time. Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open 522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent 523. The server program is _______ because it is always available, waiting for a client request. Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f

rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open 527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time. Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program 535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er. Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control

led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain 544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain to resolve its IP address? Answer: b. kenz.acct.sony.jp 551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true.

553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once 555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding 561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type 562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG 563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type 565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email.

Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above 568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above 575. A request message always contains _______. Answer: d. A request line and a header 576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number 577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. Answer: a. PUT 579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents

581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP 583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response 587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? Answer: c. Static 592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head 593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute

595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above 597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE 603. Which category of HTML tags allows the listing of documents? Answer: c. List 604. A program can use _______ to write a CGI program. Answer: d. Any of the above 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static 606. The server receives input from a browser through _______. Answer: b. A form 607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML

609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression 618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______. Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver

623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file. Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive 628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode 632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only 633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm 634. Before a message is encrypted, it is called _______. Answer: d. Plaintext 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher

637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key 639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above 642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509 647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a

second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS 655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce 658. A _______ certifies the binding between a public key and its owner. Answer: c. CA 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC

663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH 668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______. Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer level. Answer: c. IPSec 673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy. Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall

676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid 681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits 5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses. Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets 10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded?

Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol? Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop? Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above. 11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol. Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP? Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______.

Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited 3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der? Answer: C) Length of header 9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence 12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application program. Answer: C) Socket 15 INCORRECT The _______ field is used to order packets of a message. Answer: A) Sequence number 16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea

19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? Answer: D. EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25 Answer: C. Centronics-50 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Answer: C. Repeater 9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment

10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? Answer: C. Coax 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer: A. Print server 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout

1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. Answer: B. RG-58 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus 7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP 12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Answer: D. Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? Answer: B. NAS devices are less expensive. 16. used on Answer: 17. Answer: 18. An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500 Which network component is used in conjunction with a router to provide

access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Answer: B. NIC In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro

ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000

______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash 14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention? answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS 17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server 19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM?

answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash 26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use? answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet. Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address. If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time.

What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination? answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs? answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP

What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers? answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP? answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1 answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message?

answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error? answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0 Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM

Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing? answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table? answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards? answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM. Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries? answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay. When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to

a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20 Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires? answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing? answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2 Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl

ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree 003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors 004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field. answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size

009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1 016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP 020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec 021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process 022. Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control 023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true?

answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet. answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____ answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16

Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8 Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011 The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______. answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium The information to be communicated in a data communications system is the ______ . answer: Message Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b

etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented _____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP Thick Ethernet can be extended to _____ meters per segment answer: 500 _____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite?

answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____ answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___ _ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____ _ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called ..

answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise ______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address.

Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17

The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe

en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____.

Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011

Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62

Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly.

Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live)

Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94

This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105

What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time

Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127

FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139

The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 .

Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151

in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision meters per segment. protocol for communication over point

Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 . .

A TCP segment is encapsulated in Answer: an IP datagram Question 173

In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP

Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN

What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct

15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks

34. nswer. Answer: 35. Answer:

In ___ resolution, the resolver expects the server to supply the final a recursive By default, FTP uses which ports? 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct

11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses

16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored

9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen

ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to:

Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are:

Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing

4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station

5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes.

Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A)

Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32

Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this?

Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______.

Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____.

Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses

is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c

omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s

erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer

What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP?

Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol?

Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype

What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer?

Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts

What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number

Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____

Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b

its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram

DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____.

Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning?

answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5

What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media?

Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network

Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages.

Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50

With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub.

Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72

A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l

ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP

Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E

SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115

In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag

Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture:

Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control .

Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n meters per segment. protocol for communication over point .

etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. . .

Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. . .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t

o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires

Answer:

all nodes to know link costs to their neighbours

In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec

11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da

ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder

6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix

12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. Answer: 2. __times Answer: 3. Answer: 4. ______is used to compress video. JPEG According to the Nyquist theorem, we need to sample an analog signal____ the highest frequency. Two ______is more powerful and complex than______. IMAP4; POP3 What does the URL need to acess a document

Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide

ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP

11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f

iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3

22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed

8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?---------------------------

Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily

Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee?

Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically?

Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK

2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80.

Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)?

Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages.

Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process

Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A)

Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits

Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi

gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream

TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer)

Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address?

Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent

requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer

Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou

ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)?

Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event.

CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t

he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s:

Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__

Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First

A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP

In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts

Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is

Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing

1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product

1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10

In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21

The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process.

Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error

Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55

In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is?

Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1

Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88

Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte

rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth?

Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120

HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA

Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. .

Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? .

Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? meters per segment. protocol for communication over point

Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 . . . .

Connection establishment in TCP is called Answer: three-way Question 177

handshaking.

In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187

In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are

2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document

Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica

l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics

5. Answer: 6. Answer:

What network device decreases collision switch Transceiver _____specifies a physical star topology central hub . Twisted-pair

1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and

electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer

Answer: 10. Answer: 11. Answer: 12. Answer:

Physical Which cable type used for segment lenth more than 2000m. Fiber optics What network device decreases collision switch Transceiver _____specifies a physical star topology central hub . Twisted-pair

11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering

Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following? Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation? Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed? Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion? Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps? Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching?

Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets? Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers? Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity? Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols? Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur? Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers? Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router?

Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates? Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded? Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27? Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list? Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs? Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2? Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address?

Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing? Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates. Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network? Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1

Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer? Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure? Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following? Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs? Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off? Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames

Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols? Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork? Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments

Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table? Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request? Answer: #Ping 8. If Acme Inc. occupies the first three floors of a building and each flo or is 1500 square meters, how many wiring closets should be installed answer: six 8. What is the first step in locating a wiring closet for a network? answer: Identify on a floor plan, all devices that will be connected to the netw ork. 8. What kind of power disturbances can be caused by strikes?

answer: surges 8. What network device is used in an extended star topology when the catchment a rea of one wiring closet is not enough? answer: repeatter 8. What is a common cause of oscillation often called harmonics? answer: excessively long electrical wiring runs 8. Why are common mode problems a hazard to you or your computer? answer: They go directly to the computer chassis. 8. Where should the main distribution facility (MDF) be located in a multi-story building using an extended star topology? answer: on one of the middle floors 8. What best describes the difference between alternating and direct current? answer: DC flows at a constant value, whereas AC rises and falls. 8. How does AC line noise create problems? answer: by adding unwanted voltage to the desired signals 8. What is the "one-hand rule?" answer: Only touch electrical devices with one hand at a time to prevent electri city from flowing through the body. 8. Which type of networking media is now installed most often for backbone cabli ng? answer: 62.5/125 micron fiber-optic cable 8.Which of the following is a source that can produce interference on UTP cable? answer: fluorescent lights 8. Why are split pairs a problem for network installations? answer: The wires are part of different circuits so signals are not protected an d cross-talk occurs. 8. When should cable not be routed in an existing raceway?if it already contains a power cable answer: if it already contains a power cable 8. What is the central junction for the network cable? answer: wiring closet 8. What should be used to mount cable to a wall? answer: tie wraps 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: IDFs 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: Wear baggy clothes. 8. What tool would you use to attach CAT5 cable to a patch panel? answer: punch tool 8. What is one advantage of using distribution racks for mounting patch panels? answer: allows easy access to both the front and back of the equipment 8. Why is the wiring sequence critical when RJ-45 jacks are used at the telecomm unications outlet in a horizontal cabling scheme? answer: For the network to function properly. 8. What is the most important thing to do before you work in walls, ceilings or attics? answer: Turn off power to the area. 8. What kind of jack must be used for making a connection to a Category 5 unshie lded twisted pair cable in a horizontal cabling scheme? answer: RJ-45 8.Why shouldn't you install a jack in the bottom five centimeters of a wooden ba seboard? answer: The bottom plate of the wall will prevent you from pushing the box 8. Which of the following describes a cable tester measurement of signal attenua tion? answer: It measures the reduction in power of a signal received from a signal in jector. 8. How is an RJ-45 jack surface mounted?

answer: adhesive backed or screw box 8. What is the first thing you should do if near-end crosstalk is detected? answer: Visually check the horizontal cabling. 8.Which best describes a patch panel's function? answer: It acts as a switchboard where horizontal cabling from workstations can be connected to other devices to form a LAN. 8. How many pins are on each of the ports of a patch panel? answer: 8 pins 8. What should be done when preparing to run cable? answer:Label the boxes and cable. 8. What kind of a cable must you use when laying cable through spaces where air is circulated? answer: fire rated 8. How does a cable tester (a TDR) measure distance? answer: It times the signal sent towards and reflected back from the end of an o pen-ended cable 8. What type of raceway should be used if it will be visible in the room? answer: decorative 8. Why is establishing a baseline performance level for a network important? answer: for future periodic testing of the network and diagnostics 8.What is a rough diagram that shows where the cable runs are located called? answer: cut sheet 8. When running cable from the wiring closet to wall jacks, where is the cable i tself labeled? answer: at each end 8. What characteristic must hosts on a network possess in order to communicate d irectly ? answer:same network ID 8. Which of the following describes the effect of subnetting on the amount of br oadcast traffic? answer: decreases it, because broadcasts are not forwarded outside a subnet 8. Which of the following correctly describes an ISP? answer: Internet Service Provider 8.Which of the following is an example of a Class C broadcast address? answer: 221.218.253.255 8. What is decimal number 164 in binary? answer: 10100100 8. Which of the following is the approximate number of hosts supported in a answer:65 thousand 8. Which of the following describes the relationship between path determination and the routing of packets? answer: they are the same process 8. Which OSI layer adds an IP header? answer: Layer 3 8.Which type of addressing scheme is formed by MAC addresses? answer: flat 8. Which address(es) appear in an IP packet's header? answer: source and destination addresses 8. Which of the following is a benefit of network segmentation? answer: reduced congestion 8. Which of the following would be the decimal value of the binary IP address 11 001101.11111111.10101010.11001101? answer: 205.255.170.205 Why is a static route the preferred method for reaching stub networks? answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? answer: proxy ARP

Which is an example of a routed protocol? answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? answer: transport What do routers use to exchange routing tables and share route information? answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? answer: IGRP In a connectionless system, which of the following is correct? answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? answer: IP What are the two proprietary routing protocols developed by Cisco? answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? answer: the domain The Telnet application works mainly at which layers of the OSI model? answer: application, presentation, and session Which application layer protocol supports e-mail programs? answer: POP3 What is the language used to create web pages? answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? answer: IP address Which protocol is designed to download or upload files on the Internet? answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? answer: application

Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? answer: DNS E-mail addresses consist of which two parts? answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? answer: hyperlink What is the data-link destination address of a broadcast message? answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? answer: All devices look at the request and ONLY host B will reply with the MAC address. Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? answer: Session Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number 1. What is the framing method used in PPP? answer: byte stuffing 2. Assumme the RTT 200ms, the transmission time of a Web object 10ms,how long do es it take answer: 410ms 3. FPT uses port 21 for sending answer: Identification and password...data file 4. In the exponential backoff phase of CSMA/CD, after n collisions of a frame, t he adapter then waits K x 512 bit answer: {0,1,2,...,2m-1} where m=min(n,10) 5. In the PPP frame, the........... field defines answer: FCS 6. Main reason of packet loss in the Internet is...... answer: Routers drop packets because their buffers are full 7. The Link State (LS) algorithm results in....... answer: The least cost path fromm one node to all nodes in the network 8. What are the two methods of circuit switching for dividing answer: FDM and TDM 9. In the DNS, the names are defined in .......... structure answer: A tree 10. What is the protocol that network devices answer: DHCP 11. A name server is....... for a host if it always has a DNS record that answer: Authoritative

12. In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link 13. Two-dimensional parity check can......... answer: Detect a single bit error and correct it 14. Which statement is correct about packet switching and circuit switching answer: With the same delay performance, packet-switching allows more number of users than circuit switching 15. Why CSMA/CD is not used in Wifi? answer: Because of the hiden terminal problem and fading problem 16. When CRC is calculated consider the 4-bit generator G=1001 and suppose that D has the value 111010. answer: 101 17. Those followings answer: TCP congestion control 18. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of Ip addresses that can be assigned to this subnet answer: 129.17.129.96-129.17.129.127 19. Which delay mainly depends on the congestion of the network? answer: congesting delay 20. What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unittime 21. Traceroute command uses answer: ICMP 22. Which one is correct about P2P network? answer: A user computer can be both client and server 23. Generic router architecture includes answer: All of them 24. The core of the internet consist of answer: Routers 25. Very popular browser-based email services such as Hotmail or Yahoo! answer: HTTP 26. There are 4 serial links between the client and the server, with the transmi ssion rates being 1Mbps, 3Mbps, 2 Mbps answer: 0.5 Mbps 27. Which of the following is the Mac protocol answer: CSMA/CD 28. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the first collision of a frame, the adapter then waits.... answer: 512 microseconds 29. IMAP is designed to allow users to manipulate......., so it is more..... tha n POP3 answer: Remote mailboxes...complex 30. CSMA/CA belong.....group, one of three broad classes of MAC protocols answer: Random access 31. What is incorrect about Web cache (proxy server)? answer: Web caches can improve in Internet performance in general 32. The transport layer protocol provides logical communication between....runni ng on different hosts, while the network layer protocol provides logical communi cation between..... answer: Processes...Hosts 33. In TCP congestion control, two important variables the sender has to keep tr ack are answer: Congestion window and socket number 34. In IP fragmentation, a datagram is fragmented into two packets, the the firs t packet has answer: Offset=0 and FragFlag=1 35. rdt3.0 provides reliable data transfer over a ........... answer: Lossy channel with bit errors 36. The time-to-live (TTL) field in the datagram is included to insure that data grams.......

answer: Do not circulate forever in the network 37. A datagram is fragmented into three smaller datagrams. Which of the followin g is true? answer: The identification field is the same for all three datagrams 38. Each TCP segment has ......bytes of header overhead where as UDP has.... byt es of overhead. answer: 20...8 39. In OSI model, as data packet moves from the lower to the upper layer header are .... answer: removed 40. Which one is correct about Denial of Service (DOS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic. 41. Which statement is correct about router? answer: Each interface to have an unique IP address. 42. Which of the following is hybrid of client-server and P2P? answer: Skype 43. Channel partitioning, random access, and taking turns are ..... answer: Mac protocols 44. The broadcast MAC address in Lan is answer: FF-FF-FF-FF-FF-FF 45. The DNS protocol runs over ........... and uses port ................. answer: UDP...53 46. In Congestion avoidance of TCP flow control, if timeout occurs while the cur rent congestion window size is 16, the congestion window will answer: Remain 16 47. What is the total delay for transmission of 1.25 megabytes of images over fi ber optic cable with distance of 3000km with transmission rate of 1 Gbps answer: 20msec 48. Which one is not in UDP segment header? answer: Receiving Window Size 49. The ........... that together implement the DNS distributed database, store .......... for the hostname to IP address mappings. answer: Authoritative servers .....Entries 50. What is Not a function of a router? answer: Working with IP address. 51. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in but before the rest of frame has arrived 52. The purpose of ICMP echo request and ICMP echo relay messages is to...... answer: report errors 53. This job of delivering the data in a .....to the correct.........is called d e-multiplexing answer: tranport-layer segment....application process 54. The combination of an IP address and a port number is called a.... answer: socket 55. Which layer in the Internet that connects directly to wire? answer: Physical 56. ......... is a supplementary protocol that allows non-ASCII data to be sent through email. answer: MIME 57. ......Applications typically uses......... answer: Elastic....DNS 58. In TCP, what can happen if the timeout is smaller than the connection's roun d-trip time? answer: It can result in unnecessary retransmissions 59. Which of the following is the pipelining protocol answer: Selective Repeat 60. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?

answer: 201.14.78.64 Which layer of the OSI model ensures reliable, end-to-end communications? answer: transport Which layer of the OSI model provides routing functionality? answer: Network Which layer of the OSI model translates the data from upper-layer protocols into electrical signals and places them on the network media? answer: Physical You are a consultant designing a network for a company with more than 1000 users . Which 802 standard would you implement to ensure that bandwidth would be suffi cient and equal without bridging or additional segments? answer: 802.5 You have a limited budget and need to design a network for 50 users. Which 802 s tandard would you implement? answer: 802.3 You are installing a Windows 95/98 based TCP/IP network. You accidentally set work station B to the same IP address as workstation A. Which workstation(s) will rec eive an error message? answer: Both You are installing a Windows 95/98 based TCP/IP network. You accidentally set work station B to the same IP address as workstation A. Which workstation(s) will hav e a valid IP address? answer: Workstation A Unix uses which method to resolve Transport layer names into logical network add resses? answer: DNS Which of the following protocols use a connectionless transport? (Choose all tha t apply.) answer: TFTP Which protocols use a connection-oriented transport? answer: HTTP Which name resolution system is implemented with TCP/IP by default? answer: DNS Which OSI model layer has both a MAC sublayer and an LLC 12 sublayer? answer: Data Link Which OSI model layer is responsible for establishing, maintaining, and breaking down dialog? answer: Session Which OSI layer is responsible for network services such as messaging and file t ransfer? answer: Application Which OSI layer is responsible for building and tearing down packets? answer: Network On an Ethernet network, every station must have a _______________ answer: NIC Which type of hub doesn t require power? answer: Passive You are the administrator of a 100-station Ethernet network. Your users are comp laining of slow network speeds. What could you replace your hub with to increase your network throughput? answer: Switch At which OSI model layer do routers operate? answer: Network Which of the following is a MAC address? answer: 01:A5:BB:A7:FF:60 A network that uses 10Base2 requires answer: thin coax Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.) answer: the geographic scope of the network / the physical layer implementation/

the number of hosts to be interconnected Refer to the exhibit. Assuming that the network in the exhibit is converged mean ing the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for http:// www.server/? answer: 00-0c-85-cf-65-c0 Which options are properties of contention-based media access for a shared media ? (Choose three.) answer: non-deterministic / less overhead / collisions exist What is true concerning physical and logical topologies? answer: Logical topologies consist of virtual connections between nodes. What is true regarding media access control? (Choose three.) answer: Ethernet utilizes CSMA/CD / defined as placement of data frames on the m edia / Data Link layer protocols define the rules for access to different media Which statements describe the logical token-passing topology? (Choose two.) answer: Computers are allowed to transmit data only when they possess a token. / Electronic tokens are passed sequentially to each other. A network administrator has been asked to provide a graphic representation of ex actly where the company network wiring and equipment are located in the building . What is this type of drawing? answer: physical topology What is the purpose of the preamble in an Ethernet frame? answer: is used for timing synchronization with alternating patterns of ones and zeros What statements are true regarding addresses found at each layer of the OSI mode l? (Choose two.) answer: Layer 2 may identify devices by a physical address burned into the netwo rk card / Layer 3 represents a hierarchical addressing scheme Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit? answer: Network 1 uses CSMA/CD and Network 3 uses CSMA/CA. Refer to the exhibit. How many unique CRC calculations will take place as traffi c routes from the PC to the laptop? answer: 4 Refer to the exhibit. A frame is being sent from the PC to the laptop. Which sou rce MAC and IP addresses will be included in the frame as it leaves RouterB? (Ch oose two.) answer: source MAC - Fa0/1 on RouterB / source IP - PC Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? answer: MAC What two facts are true when a device is moved from one network or subnet to ano ther? (Choose two.) answer: The device will still operate at the same Layer 2 address. / The Layer 3 address must be reassigned to allow communications to the new network. What is a function of the data link layer? answer: provides for the exchange data over a common local media What is a characteristic of a logical point-to-point topology? answer: The media access control protocol can be very simple. What is a primary purpose of encapsulating packets into frames? answer: facilitate the entry and exit of data on media What is the primary purpose of the trailer in a data link layer frame? answer: support frame error detection What are three characteristics of valid Ethernet Layer 2 addresses? (Choose thre e.) answer: They are 48 binary bits in length. / They are considered physical addres ses. /They are generally represented in hexadecimal format. What the kind of Ethrnet cabling using industry-standard BNC connectors to form T junctions? answer: 10Base2

What are the key functions of encapsulation? (Choose three.) answer: identifies pieces of data as part of the same communication / ensures th at data pieces can be directed to the correct receiving end device / enables the reassembly of complete messages What is a primary function of the trailer information added by the data link lay er encapsulation answer: supports error detection Which two layers of the OSI model have the same functions as the TCP/IP model Ne twork Access Layer? (Choose two.) answer: Physical / Data Link Which three statements best describe a Local Area Network (LAN)? (Choose three.) answer: A LAN is usually in a single geographical area. / The network is adminis tered by a single organization. / A LAN provides network services and access to applications for users within a common organization. Refer to the exhibit. Which networking term describes the data interleaving proc ess represented in the graphic answer: multiplexing What is the primary purpose of Layer 4 port assignment answer: to identify the processes or services that are communicating within the end devices What can be identified by examining the network layer header answer: the destination host address What is the purpose of the TCP/IP Network Access layer answer: detailing the components that make up the physical link and how to acces s it Which layer encapsulates the segment into packets answer: network Select the statements that are correct concerning network protocols. (Choose thr ee.) answer: define the structure of layer specific PDU's / outline the functions nec essary for communications between layers / require layer dependent encapsulation s What is a PDU answer: a layer specific encapsulation Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP ses sion with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A? answer: an end device Refer to the exhibit. Which term correctly identifies the device type that is in cluded in the area B? answer: intermediary What device is considered an intermediary device answer: switch Which characteristic correctly refers to end devices in a network answer: originate data flow Refer to the exhibit. How many CRC calculations will take place as traffic route s from the PC to the laptop? answer: 8 What determines the method of media access control? (Choose two.) answer: media sharing / logical topology Which devices are the layer 2 - device? (choose 2) answer: Switch + Hub The Data Link layer is divided into two sublayers answer: LLC + MAC What technology allows share single public IP address with many computers answer: NAT (Network Address Translation) What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/10? answer: 12.0.0.0 What is the first address of a block of classless addresses if one of the addres

ses is 12.2.2.76/27? answer: 12.2.2.64 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/24. answer: 256 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/30. answer: 4 What is the last address of a block of classless addresses if one of the address es is 12.2.2.127/28? answer: 12.2.2.127 What is the last address of a block of classless addresses if one of the address es is 12.2.2.6/30? answer: 12.2.2.7 In fixed-length subnetting, the number of subnets must _______. answer: be a power of 2 An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length? answer: /24 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.64/28. How many addresses are granted? answer: 16 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.32.0/27. How many addresses are granted? answer: 32 What is the default mask for class A in CIDR notation? answer: /8 What is the default mask for class C in CIDR notation? answer: /24 In ________ addressing, when an address is given, we can find the beginning addr ess and the range of addresses. answer: classfil In a block, the prefix length is /22; what is the mask? answer: 255.255.252.0 In a block, the prefix length is /15; what is the mask? answer: 255.254.0.0 In a block, the mask is 255.255.192.0; what is the prefix length? answer: /18 In a block, the mask is 255.255.255.224; what is the prefix length? answer: none of the above Which of the following is a private IP address? answer: 172.20.14.36 or 192.168.42.34 TestKing is migrating to a private IP addressing scheme. Which of the following describe the use of private IP addresses? (Choose two) answer: Addresses that cannot be routed through the public Internet. / A scheme to conserve public addresses. TestKing is using IP addressing according to RFC 1918. Which three address range s are used for internal private address blocks as defined by RFC 1918? (Choose a ll that apply) answer: 10.0.0.0 to 10.255.255.255 / 172.16.0.0 to 172.31.255.255 / 192.168.0.0 to 192.168.255.255 TestKing needs to ensure their IP network can be reached from the Internet. Whic h of the following host addresses are members of networks that can be routed acr oss the public Internet? (Choose three.) answer: 172.64.12.29 / 198.234.12.95 / 212.193.48.254 From where does a small network typically get its IP network addresses or IP blo ck?

answer: From the Internet Service Provider (ISP) What are the two results of this configuration? (Choose two) answer: Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation./ The default route should ha ve a next hop address of 64.100.0.3. The number of addresses in a class A block is answer: 16,777,216 What is the broadcast address of a machine with an address of 128.200.100.100 an d a subnet mask of 255.255.224.0? answer: 128.200.96.255 You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol w ill you use to accomplish this? answer: DHCP What is the default mask for class B in CIDR notation? answer: /16 (A /8 , C /24) 1. What is the network address for a host with the IP address 123.200.8.68/28 ? answer: 123.200.8.64 + 123.200.8.65 2. If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary, which of the following is the correct bit pattern for the first octet? answer: 0xxxxxxx + 10xxxxxx 3. Which of the following hardware devices can be used to segment your network? answer: Router + Media converter 4. Using a Class C address range 192.168.21.12, your network needs twenty-eight subnets. Which subnet mask should you use? answer: 255.255.255.248 + 255.255.255.252 5. You have been assigned a Class C network address. Your manager has asked you to create 30 subnets with at least 5 hosts per subnet for the different departme nts in your organization. What should the subnet mask be to create 30 subnets? answer: a. 255.255.255.248 + 255.255.255.242 6. Your ISP has provided you the following Class B network range 131.107.0.0/24. Which of the following statements is true regarding this network? (Choose any t wo.) answer: There are 254 usable hosts per subnet /There are 254 usable subnets 7. Using the following address and subnet mask 195.106.14.0/24, what is the tota l number of networks and the total number of host per network? answer: 1 network with 254 hosts. + 2 networks with 128 hosts.

8. IP addresses use hierarchical numbering. What portion of the address identifi es the network number? answer: Class of first octet. +Assignments of DHCP.

9. Looking at this address 255.255.255.255, which one of the following is true? answer: a. IP, a flooded broadcast.+IP, a directed broadcast.

10. What does ISP stand for?

a. Internet Service for Profit b. Internet Site Processing answer: c. Internet Service Provider 11. How many USABLE HOST addresses are available on a class B, unsubnetted netwo rk? a. 2 raised to the 16 power b. 2 raised to the 14 power c. 2 raised to the 14 power minus 2 answer: d. 2 raised to the 16 power minus 2 12. How many unique Class B NETWORK addresses are there? a. 2 raised to the 16 power answer: b. 2 raised to the 14 power c. 2 raised to the 14 power minus 2 d. 2 raised to the 16 power minus 2 13. There are ___ bits in an IP address. a. 4 b. 8 c. 24 answer: d. 32 14. In a Class A address where 4 bits have been borrowed for subnetting, ____ bi ts are left for host addresses. a. 24 answer: b. 20 c. 16 d. 4

15. What is the high order bit pattern that all Class B addresses start with in their first octet? a. 01_ _ _ _ _ _ answer: b. 10_ _ _ _ _ _ c. 1_ _ _ _ _ _ _ d. 0 _ _ _ _ _ _ _ 16. Which of the following assists devices on the same network in determining a packet s final destination? answer: a. Host ID b. Host protocol c. vendor number d. source IP address 17. What is the broadcast address of the second usable subnet in Class C where 4 bits were borrowed? a. x.x.x.255 answer: b. x.x.x.47 c. x.x.x.95 d. x.x.x.63 18. Every eight bits in an IP address is referred to as ____ ? a. Class Address b. Octet c. Address group d. Decimal group 19. The source and destination address appear in an IP packet s ____ answer: a. Header b. Footer c. Field

d. ADRS frame 20. Hosts that reside on a network with the same network ID can communicate dire ctly with each other. answer: a. True b. False 21. Given a Class A address that has been subnetted (8 bits borrowed), what is t he subnet mask? answer: a. 255.255.0.0 b. 255.0.0.0 c. 255.240.0.0 d. 0.0.255.255 22. Using a Class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use? answer: b. 255.255.255.224 +c. 255.255.255.240 Ethernet requires that valid frames must be at least answer: 64 bytes long With the following Manchester encoding, the bit stream transmitted is answer: 10100111 Which of the following is true? (choose 3) answer: An ICMP error message may be generated only for the first fragment. /ICM P messages are divided into two broad categories :query and error reporting mess /An ICMP message has 8 bite header and a variable-size data section BGP can have two types of sessions: answer: E-BGP ,I-BGP Which of the following is true? (choose 2) answer: is a dynamic mapping protocol in which a physical address is found for a given logical address. / A technique called proxy ARP _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. answer: ARP Which of the following is true? (choose 2) answer: IGMP helps a multi cast router create and update a list of loyal members related to each router interface. / IGMP is group manager protocol. BGP messages are encapsulated in _______ answer: TCP segments The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing. answer: link state The metric used by ____ is the hop count answer: OSPF is a group of networks and routers under the authority of a single administratio answer: An autonomous system (AS) Which of the following routing techniques are used in WANs answer: dynamic routing

Routing inside an autonomous system is referred to as answer: intradomain routing. _________ is an interdomain routing protocol using path vector routing. answer: BGP How "big" is a MAC address answer: 48 bit long n Ethernet addressing, if all the bits are 1s, the address is _________. answer: broadcast In the Ethernet CSMA/CD protocol, suppose a node constructs a frame and then sen ses the channel as busy. Then answer: the adapter waits until it senses the channel idle and then begins to tr ansmit the frame. Which of the following are protocols of the data link layer answer: PPP /Ethernet An ARP query packet is encapsulated in answer: an IP datagram On an Ethernet network, every host must have a answer: NIC What is the hexadecimal equivalent of the Ethernet address 01011010 00010001 010 10101 00011000 10101010 00001111? answer: 5A:11:55:18:AA:0F If an Ethernet destination address is 07:01:02:03:04:05, then this is a ______ a ddress. answer: multicast If an Ethernet destination address is 08:07:06:05:44:33, then this is a ______ a ddress. answer: unicast Which of the following could not be an Ethernet unicast destination? answer: 43:7B:6C:DE:10:00 Which of the following could not be an Ethernet multicast destination? answer: 7C:56:21:1A:DE:F4 _______ is the most widely used local area network protocol. answer: Ethernet The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first -generation 10-Mbps Ethernet. answer: 1-persistent The _______ layer of Ethernet consists of the LLC sublayer and the MAC sublayer. answer: datalink The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing. answer: MAC Each station on an Ethernet network has a unique _______ address imprinted on it s network interface card (NIC). answer: 48-bit The minimum frame length for 10-Mbps Ethernet is _______bytes. answer: none of the above The maximum frame length for 10-Mbps Ethernet is ________ bytes. answer: 1518 _________ uses thick coaxial cable. answer: 10Base5 __________ uses thin coaxial cable. answer: 10Base2 ________ uses four twisted-pair cables that connect each station to a common hub .

answer: 10Base-T ________ uses fiber-optic cable. answer: 10Base-F Fast Ethernet has a data rate of ________Mbps. answer: 100 In _________, autonegotiation allows two devices to negotiate the mode or data r ate of operation. answer: Fast Ethernet __________ uses two pairs of twisted-pair cable. answer: 100Base-TX _________ uses two fiber-optic cables. answer: 100Base-FX _________ uses four pairs of voice-grade, or higher, twisted-pair cable. answer: 100Base-T4 Gigabit answer: Gigabit answer: Ethernet has a data rate of ________Mbps. 1000 Ethernet access methods include _______ mode. both (a) and (b)

__________ uses two optical fibers and a short-wave laser source, answer: 1000Base-SX __________uses two optical fibers and a long-wave laser source. answer: 1000Base-LX __________ uses four twisted pairs. answer: 1000Base-T ________ uses short-wave 850-nm multimode fiber. answer: 10GBase-S ________uses long-wave 1310-nm single mode fiber. answer: 10GBase-L ________ uses 1550-mm single mode fiber. answer: 10GBase-E In Ethernet addressing, if the least significant bit of the first byte is 0, the address is _________. answer: unicast In Ethernet addressing, if the least significant bit of the first byte is 1, the address is _________. answer: multicast In Ethernet addressing, if all the bits are 1s, the address is _________. answer: broadcast ______defines a protocol data unit (PDU) that is somewhat similar to that of HDL C. answer: LLC The purpose of the _______ is to provide flow and error control for the upper-la

yer protocols that actually demand these services answer: LLC In the Ethernet, the _______field is actually added at the physical layer and is not (formally) part of the frame. answer: preamble In the Ethernet frame, the _______ field contains error detection information. answer: CRC Standard Ethernet (10-Mbps) uses _______ encoding answer: Manchester 100Base-TX uses _________ block coding and ________ line coding. answer: 4B/5B; MLT-3 100Base-FX uses _________ block coding and ________ line coding. answer: 4B/5B; NRZ-I 100Base-T4 uses ________ line coding. answer: 8B6T 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and _______ _ line coding. answer: 8B/10B; NRZ 1000Base-T uses ________ line coding. answer: 4D-PAM5 Quiz 1 1. One important role of the Network Layer is to: answer :D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : answer :B. Local area networks(LAN) 3. One important role of the Transport Layer is to: answer :B. to multiplex and de-multiplex messages 4. Ethernet is answer :B. a type of LAN (Local area networks) 5. The difference between TCP and UDP is : answer :A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT are for implementing: answer :B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: answer :D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST ) answer :B. share the common resource

9. Base on distance, two MOST IMPORTANT types of computer network are: answer :C. Internet and Local area networks Quiz 2 1. in sliding window Flow control with window size of W, the source _____ answer :sends up to W frames without ACK 2. Flow control____ answer :ensures the sender does not too much data that may overwhelm the receive / has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is

answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R 2.1.Which one is correct about P2P network? answer :A user computer can be both client and server 2.2.HTTP uses the services of _________ on well-known port 80. answer :TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er answer :TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? answer :All of the others 2.7.SMTP stands for answer :Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 2.9.IMAP and POP are_________ answer :Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. answer :MIME 3.1.TCP provides __________between application processes running on different ho sts answer :Logical communications 3.2.What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver 3.3.In the transport layer, the job of gathering data at the source host from di fferent application processes, enveloping the data with header information to cr eate segments, and passing the segments to the network layer is called _______. answer :Multiplexing 3.4.In the ________ algorithm of the TCP congestion control, the size of the con gestion window increases exponentially until timeout answer :Slow start 3.5.If the segment has sequence number of 128 and length of 8 bytes, the receivi ng computer will send ACK with value of _________ answer :136 3.6.Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not 3.7.What flag is used to close TCP connection? answer :FIN 3.8.The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel 3.9.TCP is a ___________ protocol. answer :Connection-oriented 3.10.TCP assigns a sequence number to each segment that is being sent. The seque nce number for each segment is the number of the _______ byte carried in that se gment. answer :First

4.1.What is the data unit used in Internet Protocol (IP)? answer :Datagram 4.2.DHCP is used by the server to: answer :Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? answer :32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? answer :All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) answer :2 4.6.Traceroute command uses answer :ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm 4.8.Routers operate in the _______ layers. answer :network 4.9.Dijkstra s algorithm is answer :A link-state routing algorithm 4.10.Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder answer :0000 5.2.______ is (are) (an) example(s) of random access MAC answer :All of them 5.3.In cyclic redundancy checking, what is CRC answer :the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN 5.5.What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet answer :CSMA/CD 5.7.Which one is the flag used for framing in PPP? answer :01111110 5.8.Which one can be a MAC address? answer :00-D0-56-F2-B5-12 5.9.ARP stands for __________ answer :Address Resolution Protocol 5.10.Parity checking _____. answer :can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests answer :proxy 2. The_______usually contains the sender address,the receiver address,and other information answer :envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. answer :base64 4. By default,FTP uses which ports? answer :20 and 21 5. HTTP uses the services of______on well-known port 80 answer :TCP 6. In the DNS, the names are defined in_________structure answer :an inverted-tree

7. _________is a language for creating Web pages. answer :HTML 8. With WWW as an example of client-server computer software,the server is: answer :The machine that makes WWW documents available. 9. A________document is created by a Web server whenever a browser requests the document. answer :dynamic 10. In a________connection,the server leaves the connection open for more reque sts after sending a response. answer :persistent 11. Which of the following statement is correct? answer :Full-Duplex :Communications in which both sender and receiver can send a t the same time 12. In cyclic redundancy checking,what is CRC answer :the remainder 13. IP is________datagram protocol answer :unreliable 14. In the________algorithm the size of the congestion window increases exponen tially until it reaches a threshold. answer :slow start 15. TCP uses___________to check the safe and sound arrival of data. answer :an acknowledgment mechanism 16. In the OSI model,encryption and decryption are functions of the________layer . answer :presentation 17. In________resolution,the resolver expects the server to supply the final . answer :recursive 18. The purpose of echo request and echo reply is to answer :check node-to-node communication 19. HDLC is a_______protocol answer :bit-oriented 20. To accomplish flow control,TCP uses a_________window protocol. answer :sliding 21. TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. answer :stream ;stream 22. In sliding window flow control,if the window size is 63.What the range seque nce numbers? answer :0 to 63 23.In the OSI model,what is the main function of the transport layer? answer :process-to-perocess message delivery 24. Why was the OSI model developed? answer :standards were needed to allow any two systems to communicate 25. ________is more powerful and complex than______ answer :IMAP4;POP3 26. In moderm implementations of TCP,a retransmission occurs if the retransmissi on timer expiersor_______duplicate ACK segment have arrived answer :three 27. _______is the protocol suite for the current Internet answer :TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ answer :protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. answer :none is correct 30. To accomplish flow control,TCP uses a______window protocol. B answer :sliding

31. What network device decreases collision? answer :SWITCH 32.At the CRC generate,_______added the data unit before division process answer :0s are 33. Jitter is introduced in real-time data by the______ answer :delay between packets 34. What does the URL need to access a document answer :all are correct 35.What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer :DHCP 36. What flag is used to close TCP connection? answer :FIN 37.Maximum number of data flow through in N-port switch (LAN switch L2): answer : N/2 38. Base on distance, two MOST IMPORTANT types of computer network are: answer :Internet and local area network. 39. One important role of the Network Layer is to: answer :Perform network routing, i.e., to find the most efficient transmission r oute between two computers. 40. One important role of Transport Layer is to: answer :To multiplex and de-multiplex messages. 41. The difference between TCP and UDP is : answer :TCP is a protocol in Network Layer while UDP is in the Transport Layer. 42. Ethernet is answer :A type of LAN 43. As learned in class, computer networks are classified based on: answer :Distance, switching 44. Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g : 54 Mpbs belong to: answer :LAN 45. DHCP is used to answer :Assigned IP addresses automatically 46. A binary file is 3375 bytes long. How long will it be if encoded using base6 4 encoding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? answer :4604

What type of service that VC network provides? (A) answer :Connection-oriented

The physical layer is concerned with the movement of ___ over the physical mediu m. answer :bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? answer :18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. answer :OSI ___ audio/video refers to on-demand request for compressed audio/video files. answer :Interactive If ASCII character H is sent and the character I is received, what type of error s is this? answer :single-bit If ASCII character D is sent and the character G is received, what type of error s is this? answer :multiple-bit What type of routing protocol that BGP is? answer :Link State Routing A bridge has access to the ___ address of a station on the same network. answer :physical The ___ layer is responsible for the delivery of a message form one process to a nother. answer :transport Routers function in the ___ layers. (A) answer :none is correct/data link and network The purpose of MTA is answer :Transferall of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? answer :strict source route What is the service that the UDP protocol provides? (C) answer :error detection What is information used to route packet in network? answer :destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) answer :uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. answer :10BASE-T The ____ domains define registered hosts according to their generic behaviour answer :Generic

A packet whose destination is outside the local TCP/IP network segment is sent t o the answer :Default gateway Which piece of information is not vital for a computer in a TCP/IP network? answer :DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. answer :removed Session layer of the OSI model provides answer :Dialog control IPv6 has _______ -bit addresses. answer :128 Which of the following can be an Ethernet physical address? answer :07:01:02:01:2C:4B An IP address contains________ bits ? answer :32 Which routing protocol below is used by exterior routers between the autonomous systems? answer :BGP Which of the IP headers decides when the packet should be discarded? answer :TTL(time-to-live) Which IP address is reserved for software loop-back? answer :127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? answer :190.148 Which port is reserved for use of the SMTP protocol? answer :25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? answer :62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? answer :Assignment of more IP addresses Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? answer :EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? answer :Transport layer The Physical layer is connected with the movement of____over the physical medium .

answer :Bits Which of the following statement is correct? answer :Full-Duplex: Communications in which both sender and receiver can send a t the same time What is the purpose of the IEEE 802 commitlee? To develop LAN standards In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ answer :Removed Which of the following is an appropriate description concerning B2C? answer :Ordering books online Which of the following is an appropriate description concerning mobile network u sers? answer :A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer. answer :Presentation Quiz Chapter3 If ASCII character G is sent and the character D is received, what type of error is this? answer :Burst At the CRC generate, added the data unit before division process. answer :0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state answer :Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state answer :Authenticating At the CRC checker,______if the data unit is damaged. answer :A nonzero remainder HDLC is a________protocol answer :Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? answer :Single-bit In cyclic redundancy checking, what is CRC answer :The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? 0 to 63 What is present in the HDLC control fiels for I-frame All are correct 11. G At the CRC generate, ___ added the data unit before division process. Answer :0s are Quiz Chapter4 What device can . answer :All Maximun of data flow through in N-port switch (an with L2) answer :N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? answer :1 Repeaters function in the layer answer :Physical Which cable type used for segment lenth more than 2000m. answer :Fiber optics What network device decreases collision switch answer :Transceiver _____specifies a physical star topology central hub .

answer :Twisted-pair Quiz Chapter5 What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? answer :DHCP What is information used to route packet in network? answer :Destination Address fields in IP header What type of routing algorithm that OSPF use? answer :Shortest Path Routing What does the IP header s protocol field identify? answer :The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? answer :All are correct IP is________datagram protocol answer :Both a and b In classless addressing,_______is assigned to an organization. answer :A variable-length block Which layer does ICMP reside in? answer :Physical DHCP is used to: answer :Assign IP addresses automatically What is protocol used to inform errors concerning IP? answer :ICMP 11. In classless addressing, the ______ is another name for the common part of the address range. answer :prefix 12 In classless addressing, the _______ is the varying part (similar to the hostid). answer : suffix 13 In classless addressing, the prefix length defines the _____________. answer :mask 14 The number of addresses assigned to an organization in classless address ing _______. answer : must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. answer : must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? answer : 2.4.6.64

17 Which address could be the beginning address of a block of 16 classless addresses? answer :none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? answer : 2.4.6.0 19. What type of routing protocol that BGP is? answer :Distance Vector Routing

Quiz Chapter6 What is the data unit used in TCP? answer :Segment What is the service that the UDP protocol provides? answer :Guaranteed delivery What flag is used to close TCP connection? answer :FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ answer :Uses buffers The difference between TCP and UDP is primarily answer :One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. answer :Stream; stream TCP uses______________to check the safe and sound arrival of data. answer :An acknowledgment mechanism TCP is a (n)__________transport protocol. answer :Reliable What is the combination of an IP address and a port number called? answer :A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a answer :Randomly generated number Quiz Chapter7 ______is used to compress video. answer :JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. answer :Two ______is more powerful and complex than______. answer :IMAP4; POP3 What does the URL need to acess a document answer :All are correct The purpose of MTA is answer :Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt. answer :Static With WWW as an example of client-server computer software, the server is: answer :The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. answer :Streaming stored In______resolution, the resolver expects the server to supply the final . answer :Recursive By default, FTP uses which ports? answer :20 and 21 11 . Currently two message access protocols are available:_____ and_____. answer :POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : answer :The machine that you use to display WWW documents Quiz 1 1. One important role of the Network Layer is to:

answer :D.Perform network routing, i.e., to find the most efficient transmission route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : answer :B. Local area networks(LAN) 3. One important role of the Transport Layer is to: answer :B. to multiplex and de-multiplex messages 4. Ethernet is answer :B. a type of LAN (Local area networks) 5. The difference between TCP and UDP is : answer :A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT are for implementing: answer :B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: answer :D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST ) answer :B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: answer :C. Internet and Local area networks Quiz 2 1. in sliding window Flow control with window size of W, the source _____ answer :D. sends up to W frames without ACK 2. Flow control____ answer :B. ensures the sender does not too much data that may overwhelm the rece ive / D. has two techniques : Stop and Wait and Sliding window 3. In Stop and Wait Flow control, source____ answer :B. waits for the acknowledgment(ACK) before sending next frame 4. At the CRC checker, ____ if the data unit is damaged answer :D. a nonzero remainder 5. CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ w hile CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ answer :A. Ethernet__ Wireless Lan 7.If ASCII character H is sent and the character I is received, what type of err or is this? answer :a. Single-bit 8. Parity checking ___ answer :C. can detect a single bit error in a transmission 9. If ASCII character G is sent and the character D is received, what type of er ror is this? answer :d. Burst

Quiz 3 1. IP address written as 200.23.16.0/23 means: answer :C. both are correct 2. A Virtual Circuit consists of answer :D. all are correct 3. What is the last address of a block of classless address if one of the addres ses is 12.22.2.127/28 answer :D. none of them 4. In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram answer :B. 2 5. What are general functions of router? answer :D. all are correct 6. An organization is granted a block of classless addresses with the starting a ddress 199.34.76.128/29. How many addresses are granted? answer :B. 8 7. Bridges function in the ___ layers answer :A. physical and data link 8. The time to live field in IP datagram answer :C. both are correct 9. NAT router must answer :C. both are correct 10. In a Datagram networks answer :D. all are correct 11. How big is an IPv6 Internet address? answer :A. 128 bits 12. Which field in the IP header is used to prevent an IP packet from continuous ly looping through a network answer :C. time to live 13. Assume that the IP address has only 8 bits, first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnet can be addressed answer :B. 32 subnets and 8 hosts 14. What is tha data unit used in Internet Protocol(IP) answer :C. datagram 15. Which device can amplify and make signal to all computer in LAN answer :C. repeater 16. What is the protocol that network devices ( for example: modem ADSL) use to assign IP address to PCs in LAN automatically answer :B. DHCP Quiz 4 1. TCP is a(an)____ transport protocol

answer :C. reliable 2. What is WRONG about UDP? answer :D. Use ACK to notify the sender that the packet has arrived the receiver 3. In Congestion avoidance of TCP congestion control, when timeout occurs, the c ongestion window _____ answer :C. Reduce to 1 4. In modern implementations of TCP, a retransmission occurs if the retransmissi on timer expires or ___ duplicate ACK segments have arrived answer :C. three 5. Those following: a) Slow start b) Congestion avoidance Fast recovery, are mechanisms of______ answer :A. TCP congestion control c) fast retransmit d)

6. If the segment has sequence number of 128 and length of 8 bytes, the receivin g computer will send ACK with value of answer :C. 136 8. What flag is used to close TCP connection? answer :B. FIN 9. In TCP congestion control, when timeout occurs answer :D. The threshold congestion window will be set to half of the current wi ndow size 10. What is the data unit used in TCP answer :A. Segment 11. What is the combination of an IP address and a port number called? answer :A. A socket 12. In the ____ stage of the TCP congestion control, the size of the congestion window increase exponentially until timeout occur. answer :C. slow start 13. The value of the acknowledgment field in a segment defines the number of the ___ bytes a party expects to receive answer :C. next 14. The difference between TCP and UDP is primarily answer :B. One is connection-oriented, one is connectionless 15. TCP assigns a sequence number to each segment that is being sent. The sequen ce number for each segment is the number of the ___ byte carried in that segment answer :A. first Quiz 5 1. In HTTP, a ______ server is a computer that keeps copies of responses to rece nt requests answer :B.proxy 2. With WWW as an example of client-server computer software,the server is: answer :A. The machine that makes WWW documents available. 3. In a________ connection, the server leaves the connection open for more reque sts after sending a response.

answer :A.persistent 4. _____ is a language for creating Web pages answer :B. HTML 5. In the ______encoding scheme, 24 bits become 4 characters,and eventually are sent as 32 bits. answer :C. base64 5. HTTP uses the services of______on well-known port 80 answer :C. TCP 7. What is the total delay for transmission of 2000Mb of text over fiber cable w ith distance of 3000km with transmission rate of 2Gbps (ignore all other delay) answer :C. 10msec 8. Which layer does ICMP functions? answer :D. network layer 9. A ________ document is created by a Web server whenever a browser requests t he document. answer :B. dynamic 10. Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is us ed in Ethernet) can NOT be used in Wireless LAN answer :D. both of them 11. Which statement is best correct about UDP and TCP? answer :D. all of them 12. A sequence of 72 bits, after encoding using BASE64, become a sequence of answer :A. 96 bits 13. By default, FTP uses which ports? answer :a. 20 and 21 14. In the DNS, the names are defined in_________structure answer :B. an inverted-tree Quiz 6 1. Which one best describes the advantage(s) of using cache in proxy server? answer :A. Reduce the delay time to download content from the remove a remove we b server 2. In cyclic redundancy checking, what is CRC answer :C. the remainder 3. In sliding window flow control. If the window size is 63. What the range sequ ence numbers? answer :C. 0 to 63 4. IP is _____ datagram protocol answer :C. both a and b 5. TCP uses __________ to check the safe and sound arrival of data answer :A. an acknowledgment mechanism 6. Which one is best correct for IMAP(Internet Mail Access Protocol)

answer :D. All of them 7. HDLC is a ________ protocol answer :B. bit-oriented 8. Protocol used to exchange email between email server is: answer :C. SMTP 9. In the OSI model, encryption and decryption are functions of the ____ layer answer :B. presentation 10. The purpose of echo request and echo reply is to answer :B. check node-to-node communication 11. To accomplish flow control, TCP uses a___________ window protocol answer :B. sliding 12. Which of the following statement is correct? answer :C. Full-Duplex: communication in which both sender and receiver can send at the same time. 13. In______ resolution, the resolve expects the server to supply the final answer :B. recursive 14. If the ACK value is 200, then byte_____ has been received successfully answer :A.199 15. Which one is the returned code of the response from a web server when a clie nt successful connects to the web server answer :C. 200

Quiz 7 1. ______ algorithms are more efficient for short messages answer :D. Asymmetric-key 2. Which field in the IP header is used to prevent an IP packet from continuousl y looping through a network? answer :A. Time to live 3. How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :B. The summation of Two Round Trip and the Transmission Time 4. Which one is best correct about symmetric-key cryptography and asymmetric-key cryptography? answer :A. Symmetric-key cryptography has the same key both sender and receiver while asymmetric-key not 5. What are general functions of router? answer :D. All are correct 6.What type of service that VC network provide? answer :A. Connection-oriented

7. The purpose of MTA (Mail Transfer Agent) is answer :C. Transferal of message across the Internet 8. We can divide audio and video services into ____ broad categories. answer :A. three 9. A three-character data frame: A FLAG B when framing methods using Flag bytes with stuffing, the output will be: answer :A. A ESC FLAG B 10. Which protocol helps to transfer non-plain text files such as image or audio files via SMTP email systems? answer :C. MINE 11. Which statement is correct about Error Control in TCP/IP model answer :A. Error Control is implemented in both Data Layer and Transport Layer 12. What is the IP address used to test a PC s network card that don t need connect PC to another PC? answer :D. all are correct 13. A _____ server loads all information from the primary server answer :B. secondary 14. The value of receiving window size is determined by ____ answer :B. the receiver 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed 1.2.There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ answer :Datagram network 1.6.Which statement is correct for "layering" in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. answer :TCP/IP 1.8.The time required for a data bit to travel through the link from router A to router B is answer :Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ answer :Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is answer :L/R

2.1.Which one is correct about P2P network? answer :A user computer can be both client and server 2.2.HTTP uses the services of _________ on well-known port 80.

answer :TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er answer :TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? answer :All of the others 2.7.SMTP stands for answer :Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 2.9.IMAP and POP are_________ answer :Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. answer :MIME

3.1.TCP provides __________between application processes running on different ho sts answer :Logical communications 3.2.What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver 3.3.In the transport layer, the job of gathering data at the source host from di fferent application processes, enveloping the data with header information to cr eate segments, and passing the segments to the network layer is called _______. answer :Multiplexing 3.4.In the ________ algorithm of the TCP congestion control, the size of the con gestion window increases exponentially until timeout answer :Slow start 3.5.If the segment has sequence number of 128 and length of 8 bytes, the receivi ng computer will send ACK with value of _________ answer :136 3.6.Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not 3.7.What flag is used to close TCP connection? answer :FIN 3.8.The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel

3.9.TCP is a ___________ protocol. answer :Connection-oriented 3.10.TCP assigns a sequence number to each segment that is being sent. The seque nce number for each segment is the number of the _______ byte carried in that se gment. answer :First 4.1.What is the data unit used in Internet Protocol (IP)? answer :Datagram 4.2.DHCP is used by the server to: answer :Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? answer :32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? answer :All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) answer :2 4.6.Traceroute command uses answer :ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm 4.8.Routers operate in the _______ layers. answer :network 4.9.Dijkstra s algorithm is answer :A link-state routing algorithm 4.10.Distance vector routing algorithm requires answer :all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder answer :0000 5.2.______ is (are) (an) example(s) of random access MAC answer :All of them 5.3.In cyclic redundancy checking, what is CRC answer :the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN 5.5.What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet

answer :CSMA/CD 5.7.Which one is the flag used for framing in PPP? answer :01111110 5.8.Which one can be a MAC address? answer :00-D0-56-F2-B5-12 5.9.ARP stands for __________ answer :Address Resolution Protocol 5.10.Parity checking _____. answer :can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer answer :802.11 2 UDP offers which of the following benefits relative to TCP answer :UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets answer :All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer answer :Session Layer 5 Which of the following is a Man answer :WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? answer :2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called answer :Cell 8 Which of the following protocols provides the security for HTTPS answer :SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network answer :Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er answer :It is used for reordering of the octets received 11 Which of the following is not function of the data link layer answer :Data rate control 12 Which of following term does NOT belong the ToS field of IP Header answer :Priority 13 In Ethernet frame, the maximum size of the Pad field is answer :64 byte 14 Flow control is needed to prevent answer :overflow of the sender buffer

15 Which of the following is a valid IPv6 address answer :2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase answer :Quantization 17. in the resource records os DNS, which record is also know as an alias record answer :CNAME record. 18. A bridge can increase network effeciency by: answer :Learning and storing the MAC address for each NIC on each side og bridge and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? answer : BNCs 20. Which of the following are characteristic of a peer-to-peer network? answer : A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can answer : talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: answer :Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. answer : Replace repeater with hubs. 24. which of the following has the highest possible throughput? answer : Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? answer :1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state answer : establish 27. Find the minimum hamming distance for the correction of two errors answer : 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m answer : half-duplex. 29. what is a router? answer : a piece of hardware or software that forwards packet sbase on ip addres s. 30. OSPF multicasts are sent out as what class of address? answer :Class A 31.what is another name for a packet-switching network? answer : store and forward. 32. updates for a satellite s coordinates can be optained on the www. answer :Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? answer : Multipart / mixed 34. Port 110(POP) is what kind of port? answer : Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? answer :A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state answer : FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b

ody of the message. answer :b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP answer :It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. answer :c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute answer :Hop count 42 The PING and the TRACEROUTE utilities uses protocol answer :ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data answer :Transport layer 44 Which of the following statements regarding protocol stacks are FALSE answer :A given protocol stack can run only one computer type In OSI model, as data packet moves from the lower to the upper layer header are.. answer :Removed There are two broad classes of packet-switched networks are: answer :datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? answer :Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network answer :Virtual-circuit network / Datagram network Which statement is correct for layering in OSI model answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. answer :TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is answer :Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ answer :Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is answer :L/R Which one is correct about P2P network? answer :A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. answer :TCP _____ provides reliable, in-order transfer of bytes between client and server answer :TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. answer :Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? answer :The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? answer :All of the other SMTP stands for

answer :Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. answer :TCP . 20 and 21 IMAP and POP are_________ answer :Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. answer :MIME TCP provides __________between application processes running on different hosts answer :Logical communications What is WRONG about UDP? answer :Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. answer :Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout answer :Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ answer :136 Which one is correct about TCP and UDP? answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? answer :FIN The difference between flow control and congestion control is primarily answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel TCP is a ___________ protocol. answer :Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . answer :First What is the data unit used in Internet Protocol (IP)? answer :Datagram DHCP(dynamic host configuration protocol) is used by the server to: answer :Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? answer :32 subnets and 8 hosts Why NAT (Network Address Translation) is used? answer :All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) answer :2 Traceroute command uses answer :ICMP RIP (Routing Information Protocol) in the Internet uses answer :Distance vector routing algorithm Routers operate in the _______ layers. answer :network Dijkstra s algorithm is answer :A link-state routing algorithm Distance vector routing algorithm requires

answer :all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder answer :0000 ______ is (are) (an) example(s) of random access MAC answer :All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) answer :the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol answer :Wireless LAN What is store-and-forward operation in switches? answer :They receive the whole frame before forwarding to next station ______is used in Ethernet answer :CSMA/CD Which one is the flag used for framing in PPP answer :01111110 Which one can be a MAC address? answer :00-D0-56-F2-B5-12 ARP stands for _________ answer :Address Resolution Protocol Parity checking _____. answer :can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. answer : (c): Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer : (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer : (b): Mesh 4. Which topology requires a central controller or hub? answer : (a): Star 5. The _______ is the physical path over which a message travels. answer : (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer : (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer : (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer : (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer : (a): Full-duplex

10. An unauthorized user is a network _______ issue. answer : (c): Security 11. Which topology requires a multipoint connection? answer : (d): Bus 12. A television broadcast is an example of _______ transmission. answer :(c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer : (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer : (d): Bus Chapter 2: Network Models 15. The _______ layer changes bits into electromagnetic signals. answer : (a): Physical 16. The physical layer is concerned with the transmission of _______ over the ph ysical medium. answer :c. Bits 17. Mail services are available to network users through the _______ layer. answer :c. Application 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. answer :d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. answer :b. Added 20. The _______ layer lies between the network layer and the application layer. answer :c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. answer :b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. answer :c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? answer :b. Transport layer 24. What is the main function of the transport layer? answer :a. Process-to-process delivery 25. Which of the following is an application layer service? answer :d. All the above 26. The Internet model consists of _______ layers. answer :b. Five 27. The process-to-process delivery of the entire message is the responsibility

of the _______ layer. answer :c. Transport 28. The _______ layer is the layer closest to the transmission medium. answer :b. Physical Chapter 3: Signals 29. Before data can be transmitted, they must be transformed to ________. answer :a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. answer :b. Is greater than zero 31. A periodic signal can always be decomposed into ________. answer :c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? answer :c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. answer :a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. answer :c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. answer :b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? answer :d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? answer :a. 3.96 MHz 39. As frequency increases, the period ________. answer :a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. answer :c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. answer :c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. answer :a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? answer :c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal?

answer :b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. answer :b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. answer :b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. answer :b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. answer :a. The signal is equal to the noise 49. A sine wave is ________. answer :d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. answer :c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. answer :b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. answer :d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. answer :c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. answer :b. Noise 55. The ________ has units of meters/second or kilometers/second. answer :c. Propagation speed 56. ________ has units of bits/second. answer :a. Throughput 57. The ________ has units of seconds. answer :b. Propagation time 58. The wavelength of a signal depends on the ________. a. Frequencies of the signal answer :b. Medium Chapter 4: Encoding and Modulation 59. Which encoding technique attempts to solve the loss of synchronization due t

o long strings of 0s? answer :b. BnZS 60. Block coding can help in _______ at the receiver. answer :a. Synchronization / b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. answer :a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. answer :b. Line 63. _______ encoding has a transition at the middle of each bit. answer :d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. answer :a. Differential Manchester 65. PCM is an example of _______ conversion. answer :b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? answer :d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. answer :a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. answer :c. Variable 69. Synchronous transmission does not have _______. answer :d. All the above 70. Which encoding type always has a nonzero average amplitude? answer :c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? answer :b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? answer :b. AMI 73. In PCM, an analog-to- _______ conversion occurs. answer :b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? answer :c. 6 75. RZ encoding involves _______ signal levels. answer :c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? answer :d. 32

77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. answer :a. Asynchronous serial / b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. answer :b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels. answer :c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. answer :b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. answer :b. Less than or equal to Chapter 5: Multiplexing 82. AM and FM are examples of ________ modulation. answer :a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. answer :c. Amplitude 84. Which of the following is most affected by noise? answer :d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. answer :d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. answer :b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________. answer :d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. answer :c. Increases 89. In 16-QAM, there are 16 ________. answer :b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? answer :d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. answer :d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? answer :c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? answer :d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit?

answer :c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? answer :b. 700 KHz 96. A modulated signal is formed by ________. answer :a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. answer :b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. answer :a. 50 99. When an ASK signal is decomposed, the result is ________. answer :a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. answer :d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. answer :d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. answer :b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. answer :a. Less than 104. What is the object of trellis coding? answer :c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. answer :a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. answer :a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. answer :c. Increases 108. The bit rate always equals the baud rate in which type of signal? answer :a. FSK 109. Which ITU-T modem standard uses trellis coding? answer :a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. answer :a. Less than

Chapter 6: Switching 111. Which multiplexing technique transmits digital signals? answer :c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? answer :b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. answer :b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. answer :b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. answer :b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. answer :c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. answer :b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. answer :b. FDM 119. Which multiplexing technique transmits analog signals? answer :a. FDM / c. WDM 120. In a T-1 line, _______ interleaving occurs. answer :b. Byte 121. Which multiplexing technique involves signals composed of light beams? answer :a. WDM Chapter 7: Transmission Media 122. The VLF and LF bands use _______ propagation for communications. answer :b. Ground 123. Category 1 UTP cable is most often used in _______ networks. answer :b. Telephone 124. BNC connectors are used by _______ cables. answer :d. Coaxial 125. Which of the following is not a guided medium? answer :c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. answer :d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute

r sheath. answer :a. Coaxial 128. In fiber optics, the signal source is _______ waves. answer :b. Light 129. Smoke signals are an example of communication through _______. answer :c. An unguided medium 130. Which of the following primarily uses guided media? answer :c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? answer :a. Outer conductor 132. The RG number gives us information about _______. answer :c. Coaxial cables 133. Transmission media are usually categorized as _______. answer :a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. answer :b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. answer :b. Denser than 136. The inner core of an optical fiber is _______ in composition. answer :c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. answer :b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. answer :a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. answer :b. Multimode step-index 140. In _______ propagation, the core is of varying densities. answer :c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. answer :c. The air 142. Transmission media are closest to the _______ layer. answer :b. Physical 143. Radio wave and microwave frequencies range from _______. answer :c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. answer :d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. answer :b. Ground

146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. answer :c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. answer :d. Unidirectional Chapter 8 : Telephone, Cable, and Satellite Networks 148. The telephone service handled between two LATAs is called _______. answer :b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? answer :a. 2000 150. The _______ is a device that connects n inputs to m outputs. answer :a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. answer :c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? answer :b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. answer :d. Control unit 154. Which of the following is a time-division switch? answer :a. TSI / b. TDM bus 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. answer :a. Control unit 156. A telephone network is an example of a _______ network. answer :a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. answer :c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. answer :d. (b) and (c) 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. answer :d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. answer :c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. answer :a. Time-division

162. Data from a computer are _______; the local loop handles _______ signals. answer :b. Digital; analog 163. To create a _______, combine crossbar switches in stages. answer :b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. answer :b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. answer :b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. answer :c. Filters 167. The actual bit rate of ADSL downstream data is _______. answer :c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. answer :c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. answer :a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . answer :d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. answer :d. CMTS 172. HDSL encodes data using _______. answer :c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. answer :a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. answer :c. Head end 175. A traditional cable TV network transmits signals ______. answer :c. Downstream 176. _______ was designed as an alternative to the T-1 line. answer :c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. answer :b. User data / c. Overhead 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. answer :a. VDSL / b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node

. answer :c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. answer :a. Modulation / b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. answer :b. 6 182. _______ data go from the subscriber to the Internet. answer :b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. answer :b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. answer :a. SDSL 185. SONET is an acronym for _______ Network. answer :c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. answer :b. Downstream data 187. In a SONET system, _______ can remove signals from a path. answer :a. An add/drop multiplexer Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? answer :c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? answer :b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? answer :c. Simple parity check 191. Which error detection method involves polynomials? answer :a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? answer :c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? answer :c. Single-bit 194. In cyclic redundancy checking, what is the CRC? answer :a. The remainder 195. Which error detection method involves the use of parity bits? answer :a. Simple parity check / b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. answer :b. 1 bit more than

197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? answer :c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? answer :c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? answer :b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. answer :d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. answer :d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. answer :c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. answer :a. -0 204. In CRC the quotient at the sender _______. answer :d. Is discarded 205. The Hamming code is a method of _______. answer :a. Error detection / b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. answer :b. A nonzero remainder 207. Which error detection method can detect a single-bit error? answer :d. All the above 208. Which error detection method can detect a burst error? answer :a. The parity check / b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. answer :c. 0s are Chapter 11 : Wired Local Area Networks 210. HDLC is an acronym for _______. answer :c. High-level data link control 211. Flow control is needed to prevent ________. answer :b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? answer :c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max

imum of _______ frames sent but unacknowledged. answer :b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. answer :c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. answer :a. Go-Back-N 216. ARQ stands for _______. answer :a. Automatic repeat request 217. In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the rece iver may send an ACK _______ to the sender. answer :d. Any of the above 218. The shortest frame in HDLC protocol is usually the _______ frame. answer :c. Supervisory 219. The address field of a frame in HDLC protocol contains the address of the _ ______ station. answer :b. Secondary 220. The HDLC _______ field defines the beginning and end of a frame. answer :c. Flag 221. A timer is set when _______ is (are) sent out. answer :c. A data frame 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. answer :c. n 223. What is present in all HDLC control fields? answer :d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. answer :c. Establishing 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. answer :d. Authenticating 226. PAP requires _______ and _______ from the user. answer :c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. answer :b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. answer :d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state.

answer :a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. answer :b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. answer :d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. answer :b. Address 233. What is the purpose of LCP packets? answer :d. All the above 234. _______ is a three-way handshake for user verification. answer :b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. answer :d. Control 236. In the PPP frame, the _______ field is for error control. answer :a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. answer :c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. answer :c. 8 239. In the _______ random-access method there is no collision. answer :b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . answer :a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. answer :c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . answer :d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. answer :d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. answer :a. 1.0 245. _______ is a random-access protocol. answer :c. MA

246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. answer :a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. answer :a. 16 248. _______ is a controlled-access protocol. answer :d. Reservation 249. _______ is (are) a channelization protocol. answer :d. All the above 250. _______ is the access protocol used by traditional Ethernet. answer :c. CSMA/CD 251. The most primitive random access method is _______. answer :b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. answer :c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. answer :b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. answer :b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. answer :a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. answer :a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. answer :b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? answer :a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? answer :b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? answer :b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? answer :d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? answer :a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. answer :d. 5

264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. answer :d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. answer :a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. answer :c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? answer :b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? answer :b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? answer :c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? answer :b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. answer :c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. answer :a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. answer :d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. answer :b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. answer :b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. answer :d. 2.5 277. In an ESS the _______ station is not mobile. answer :b. AP 278. In an ESS the _______ stations are part of a wired LAN. answer :b. AP 279. A station with _______ mobility is either stationary or moving only inside

a BSS. answer :a. No-transition 280. _______ combine to form a scatternet. answer :b. Piconets 281. Bluetooth uses _______ in the physical layer. answer :c. FHSS 282. A _______ frame usually precedes a CTS frame. answer :b. RTS 283. A station with _______ mobility can move from one BSS to another. answer :c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. answer :b. ESS-transition 285. A _______ frame usually precedes an RTS frame. answer :d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. answer :b. More 287. Which MAC sublayer does IEEE 802.11 define? answer :b. PCF / c. DCF 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? answer :c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. answer :d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. answer :c. Physical 291. Stations do not sense the medium during _______ time. answer :b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. answer :c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. answer :b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. answer :c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. answer :c. Management 296. A Bluetooth network can have _______ master(s). answer :a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______.

answer :b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). answer :b. Physical (MAC) 299. A _______ is actually a multiport repeater. answer :a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. answer :d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . answer :c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. answer :b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. answer :c. Loops 304. Bridges function in the _______ layer(s). answer :a. Physical (MAC) / b. Data link 305. In a VLAN, stations are separated into groups by _______. answer :a. Software methods 306. A bridge can _______. answer :d. Do all the above 307. A _______ bridge has the smallest ID. answer :d. Root 308. A bridge never forwards frames out of the _______ port. answer :c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? answer :a. Transparent 310. VLAN technology divides a LAN into ______ groups. answer :d. Logical 311. Which of the following is a connecting device? answer :d. All the above 312. Which station characteristic can be used to group stations into a VLAN? answer :d. All the above 313. _______ is a first-generation cellular phone system. answer :c. AMPS 314. AMPS uses _______ for modulation. answer :a. FM / b. FSK 315. _______ separates the AMPS voice channels. answer :c. FDMA

316. _______ is a cellular telephone system popular in Europe. answer :a. GSM 317. D-AMPS uses _______ for multiplexing. answer :b. TDMA / c. FDMA 318. GSM uses _______ for multiplexing. answer :b. TDMA / c. FDMA 319. DSSS is used by the _______ cellular phone system. answer :b. IS-95 320. _______ base stations use GPS for synchronization. answer :b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. answer :a. Teledesic 322. IS-95 has a frequency reuse factor of _______. answer :c. 1 323. The path that a satellite makes around the world is called _______. answer :a. An orbit 324. A GEO satellite has _______ orbit. answer :d. An equatorial 325. Which orbit has the highest altitude? answer :b. GEO 326. _______ is a second-generation cellular phone system. answer :d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. answer :d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. answer :c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. answer :c. Footprint 330. In _______, a mobile station always communicates with just one base station . answer :c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. answer :d. Between the 332. _______ is often used for navigation purposes. answer :a. GPS 333. An LEO satellite has _______ orbit. answer :b. A polar 334. Teledesic is a _______ LEO satellite system. answer :b. Broadband 335. _______ has 66 satellites in six LEOs.

answer :d. Iridium 336. Transmission from the Earth to the satellite is called the _______. answer :b. Uplink 337. The _______ is not used for voice communication. answer :a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. answer :c. VOFR 339. Frame Relay provides _______ connections. answer :a. PVC / b. SVC 340. Routing and switching in Frame Relay are performed by the _______ layer. answer :c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. answer :b. Real-time video 342. The Frame Relay address field is _______ in length. answer :d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. answer :b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. answer :c. LMI 345. Frame Relay operates in the _______. answer :a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. answer :a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. answer :c. 12 348. In data communications, ATM is an acronym for _______. answer :c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? answer :d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? answer :b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? answer :a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? answer :a. AAL1 353. The VPI of a UNI is _______ bits in length. answer :d. 8

354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. answer :a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. answer :a. FRAD 356. A _______ provides a connection or a set of connections between switches. answer :b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. answer :b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. answer :a. Router 359. Identify the class of IP address 229.1.2.3. answer :d. Class D 360. On a network that uses NAT, _______ initiates the communication. answer :a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. answer :b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. answer :a. Twenty-five 363. Identify the class of IP address 4.5.6.7. answer :a. Class A 364. Identify the class of IP address 191.1.2.3. answer :b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. answer :a. Nine 366. Class _______ has the greatest number of hosts per given network address. answer :a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? answer :b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. answer :b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? answer :b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? answer :c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address?

answer :d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. answer :b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. answer :b. The datagram approach to packet switching 374. An IP address consists of _______ bits. answer :b. 32 375. On a network that uses NAT, the router can use _______ global address(es). answer :a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. answer :a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? answer :a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? answer :a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. answer :a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? answer :a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. answer :c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. answer :c. Time-exceeded 383. An ARP request is _______ to _______. answer :c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? answer :a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. answer :d. All the above 386. An HLEN value of decimal 10 means _______. answer :b. There is 40 bytes in the header 387. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? answer :c. 428 388. If the fragment offset has a value of 100, it means that _______. answer :a. The first byte of the datagram is byte 800

389. What is needed to determine the number of the last byte of a fragment? answer :b. Offset number / c. Total length 390. The IP header size _______. answer :b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. answer :b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? answer :a. Base header / c. Data packet from the upper layer 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. answer :c. ARP 394. A router reads the _______ address on a packet to determine the next hop. answer :c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. answer :c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. answer :a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. answer :c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? answer :d. All the above 399. The purpose of echo request and echo reply is to _______. answer :c. Check node-to-node communication 400. An ARP reply is _______ to _______. answer :a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. answer :a. Source-quench 402. A time-exceeded message is generated if _______. answer :b. The time-to-live field has a zero value / c. Fragments of a message d o not arrive within a set time 403. To determine whether a node is reachable, _______ message can be sent. answer :a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. answer :b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? answer :a. 39,952

406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer :b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. answer :b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. answer :b. 0 409. A routing table contains _______. answer :d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. answer :a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? answer :c. 1 412. An area border router can be connected to _______. answer :d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? answer :b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. answer :d. PIM-DM; PIM-SM 415. When a multicast router is not directly connected to another multicast rout er, a _______ can be formed to connect the two. answer :d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? answer :a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. answer :b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in answer :b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. answer :c. Broadcast 420. Which type of BGP message announces a route to a new destination? answer :a. Update 421. Which layer produces the OSPF message? answer :d. Network

422. Which of the following is an exterior routing protocol? answer :c. BGP 423. An area is _______. answer :c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? answer :c. n 1 425. Which of the following is an interior routing protocol? answer :a. RIP / b. OSPF 426. OSPF is based on _______. answer :c. Link state routing 427. BGP is based on _______. answer :c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? answer :b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? answer :c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? answer :a. Virtual 431. Which type of BGP message is sent by a router to close a connection? answer :c. Notification 432. An IGMP query is sent from a _______ to a _______. answer :a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? answer :a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. answer :c. Transient 435. In distance vector routing each router receives information directly from _ ______. answer :a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. answer :c. 5 437. _______ is a multicast routing protocol using source-based trees. answer :a. DVRMP / b. MOSPF 438. Pruning and grafting are strategies used in _______. answer :a. RPM 439. In distance vector routing a router sends out information _______.

answer :c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. answer :c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. answer :a. Version / b. Type 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. answer :a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. answer :a. Unicast 444. ________ is a multicasting application. answer :d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. answer :c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. answer :d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. answer :b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. answer :a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. answer :c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. answer :c. RPB 451. Dijkstra's algorithm is used to _______. answer :d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. answer :b. Prune 453. The _______ is used by a router in response to a received-leave report. answer :a. Special query message 454. RIP is based on _______. answer :d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. answer :d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees.

answer :d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. answer :b. CBT 458. The _______ is an IGMP message. answer :d. All the above 459. The _______ defines the client program. answer :b. Ephemeral port number 460. The _______ timer is used in the termination phase. answer :b. Time-waited 461. Which is a legal port address? answer :d. All the above 462. The definition of reliable delivery includes _______. answer :d. All the above 463. Which of the following does UDP guarantee? answer :d. None of the above 464. The source port address on the UDP user datagram header defines _______. answer :d. The application program on the sending computer 465. A host can be identified by _______ while a program running on the host can be identified by _______. answer :b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? answer :c. Length of header 467. The _______ defines the server program. answer :b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. answer :b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. answer :a. Persistence 470. Connection establishment involves a _______ handshake. answer :a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. answer :a. Persistence 472. The _______ address uniquely identifies a running application program. answer :c. Socket 473. The _______ field is used to order packets of a message. answer :a. Sequence number 474. The _______ field is used for error detection. answer :d. Checksum

475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. answer :a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. answer :b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. answer :a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. answer :b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. answer :a. Clark's solution / c. Delayed acknowledgment 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. answer :a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. answer :d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. answer :a. Keep-alive 483. UDP and TCP are both _______ layer protocols. answer :d. Transport 484. Which of the following functions does UDP perform? answer :b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. answer :d. Port 486. Karn's algorithm is used in calculations by the _______ timer. answer :b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. answer :c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. answer :c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. answer :a. Receiver / c. Congestion 490. _______ traffic features sudden data rate changes in very short periods of time. answer :b. Bursty 491. When the load is greater than the capacity, the delay _______.

answer :b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. answer :d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. answer :d. Destination; sender 494. The _______ is the maximum data rate of the traffic. answer :d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. answer :b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. answer :c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. answer :b. The access rate 498. _______ measures the variation in cell transmission time. answer :b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? answer :c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. a. Leaky bucket b. Traffic bucket answer :c. Token bucket d. Bursty bucket The correct is c 501. A flow-based QoS model designed for IP is called _______. a. RSVP answer :b. Integrated Services c. Differentiated Services d. Multicast trees The correct is b 502. A signaling protocol that helps IP create a flow is called _______. answer :a. RSVP b. Integrated Services c. Differentiated Services d. Multicast trees The correct is a 503. RSVP uses _______ messages. a. Path b. Resv c. Resource answer :d. (a) and (b) The correct is d 504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows.

a. Fixed answer :b. Shared explicit c. Wild card d. All the above The correct is b 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. a. Stability b. Reservation answer :c. Scalability d. All the above The correct is c 506. A _______ is a Differentiated Services traffic conditioner. a. Meter b. Marker answer :c. Shaper The correct is c 507. What is the relationship between the access rate and the CIR? a. CIR plus Be is equal to the access rate. b. CIR is always equal to the access rate. c. CIR is greater than the access rate. answer :d. CIR is less than the access rate. The correct is d 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. answer :a. CDV b. CLR c. CTD d. CER The correct is a 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. a. Be answer :b. Bc c. CIR d. (a) and (b) The correct is b 510. The effective bandwidth is based on _______. a. Average data rate b. Peak data rate c. Maximum burst size answer :d. All the above The correct is d 511. The cell _______ is the difference between the CTD maximum and minimum. answer :a. Delay variation b. Error ratio c. Loss ratio d. Transfer delay The correct is a 512. The cell _______ is the ratio of lost cells to cells sent. a. Delay variation b. Error ratio answer :c. Loss ratio

d. Transfer delay The correct is c 513. The _______ service class is particularly suitable for applications with bu rsty data. a. CBR answer :b. ABR c. VBR d. UBR The correct is b 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. a. ABR answer :b. CBR c. VBR d. UBR The correct is b 515. The _______ is greater than the SCR. a. MCR b. CVDT answer :c. PCR d. All the above The correct is c 516. The _______ is the fraction of the cells delivered in error. a. CLR answer :b. CER c. CTD d. CDV The correct is b 517. When added to Be, Bc should be less than the _______. a. CIR b. Committed burst size answer :c. Access rate d. (a) and (b) The correct is c 518. A connectionless iterative server uses _______ ports. answer :a. Well-known b. Ephemeral c. Active d. (a) and (b) The correct is a 519. The _______ socket is used with a protocol that directly uses the services of IP. answer :a. Raw b. Stream c. Datagram d. Remote The correct is a 520. A _______ server serves multiple clients, handling one request at a time. answer :a. Connectionless iterative b. Connectionless concurrent c. Connection-oriented iterative d. Connection-oriented concurrent

The correct is a 521. A client issues _______ when it needs service from a server. a. An active request b. A finite open answer :c. An active open d. A passive open The correct is c 522. A _______ server serves multiple clients simultaneously. a. Connectionless iterative b. Connectionless concurrent c. Connection-oriented iterative answer :d. Connection-oriented concurrent The correct is d 523. The server program is _______ because it is always available, waiting for a client request. a. Finite answer :b. Infinite c. Active d. Passive The correct is b 524. A connection-oriented concurrent server uses _______ ports. a. Well-known b. Ephemeral c. Active answer :d. (a) and (b) The correct is d 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? a. One b. Two c. Three answer :d. Four The correct is d 526. A server program, once it issues _______, waits for clients to request its service. a. An active request b. A finite open c. An active open d. A passive open answer :The correct is d 527. _______ can request a service. a. A socket interface answer :b. A client c. A port d. A server The correct is b 528. _______ can provide a service. a. An iterative server b. A concurrent server c. A client d. (a) and (b) answer :The correct is d

529. The client program is _______ because it terminates after it has been serve d. answer :a. Finite b. Infinite c. Active d. Passive The correct is a 530. _______ processes requests one at a time. answer :a. An iterative server b. A concurrent client c. An iterative client d. A concurrent server The correct is a 531. The _______ socket is used with a connectionless protocol. a. Raw b. Stream answer :c. Datagram d. Remote The correct is c 532. _______ processes many requests simultaneously. a. An iterative server b. A concurrent client c. An iterative client answer :d. A concurrent server The correct is d 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. answer :a. Well-known port b. Infinite port c. Ephemeral port d. (b) and (c) The correct is a 534. A _______ is an instance of a _______. a. Program; process answer :b. Process; program c. Process; service d. Structure; process The correct is b 535. The _______ socket is used with a connection-oriented protocol. a. Raw answer :b. Stream c. Datagram d. Remote The correct is b 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? a. 107.123.46.0 answer :b. 107.0.0.0 c. 219.46.123.0 d. 107.123.0.0 The correct is b

537. In _______ resolution the client is in direct contact with at most one serv er. a. A cache answer :b. A recursive c. An iterative d. All the above The correct is b 538. In address-to-name resolution the _______ domain is used. a. Reverse b. Generic c. Country answer :d. Inverse The correct is d 539. How is the lifetime of a name-to-address resolution in cache memory control led? a. By the time-to-live field set by the server b. By the time-to-live counter set by the server c. By the time-to-live field set by the authoritative server answer :d. (b) and (c) The correct is d 540. A DNS response is classified as ______ if the information comes from a cach e memory. a. Authoritative b. Recursive answer :c. Unauthoritative d. Iterative The correct is c 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) a. Fourth answer :b. Fifth c. Third d. Not enough information given The correct is b 542. A DNS _______ server's zone is the entire DNS tree. a. Secondary answer :b. Root c. Primary d. All the above The correct is b 543. To find the IP address of a host when the domain name is known, the _______ can be used. answer :a. Inverse domain b. Generic domains c. Country domains d. (b) or (c) The correct is a 544. A DNS _______ server gets its data from another DNS server. a. Root b. Primary answer :c. Secondary d. All the above The correct is c

545. A DNS _______ server creates, maintains, and updates the zone file. a. Root answer :b. Primary c. Secondary d. All the above The correct is b 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) a. Fourth b. Fifth c. Third answer :d. Not enough information given The correct is d 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. a. fhda answer :b. edu c. chal d. atc The correct is b 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. a. Fhda answer :b. chal c. atc d. edu The correct is b 549. In _______ resolution the client could directly contact more than one serve r. answer :a. An iterative b. A cache c. A recursive d. All the above The correct is a 550. Which of the following domain names would most likely use a country domain to resolve its IP address? a. chal.atac.fhda.edu answer :b. kenz.acct.sony.jp c. gsfc.nasa.gov d. mac.eng.sony.com The correct is b 551. A resolver is the _______. a. Host machine answer :b. DNS client c. DNS server d. Root server The correct is b 552. Which of the following is true? a. FTP allows systems with different directory structures to transfer files. b. FTP allows a system using ASCII and a system using EBCDIC to transfer files. c. FTP allows a PC and a SUN workstation to transfer files. answer :d. All the above are true. The correct is d

553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? a. Multipart/parallel b. Multipart/digest c. Multipart/alternative answer :d. Multipart/mixed The correct is d 554. During an FTP session the control connection is opened _______. a. As many times as necessary answer :b. Exactly once c. Exactly twice d. All the above The correct is b 555. The purpose of the MTA is _______. answer :a. Transferral of messages across the Internet b. Message preparation c. Envelope creation d. (a) and (b) The correct is a 556. In anonymous FTP, the user can usually _______. a. Store files answer :b. Retrieve files c. Navigate through directories d. Do all the above The correct is b 557. Which part of the mail created by the UA contains the sender and receiver n ames? answer :a. Header b. Body c. Envelope d. Address The correct is a 559. The _______ field in the MIME header uses text to describe the data in the body of the message. a. Content-transfer-encoding answer :b. Content-Id c. Content-type d. Content-description The correct is b 560. The _______ field in the MIME header describes the method used to encode th e data. a. Content-Id b. Content-description c. Content-type answer :d. Content-transfer-encoding The correct is d 561. The _______ field in the MIME header has type and subtype subfields. a. Content-transfer-encoding answer :b. Content-type c. Content-Id d. Content-description The correct is b

562. A JPEG image is sent as email. What is the content-type? a. Multipart/mixed b. Multipart/image c. Image/basic answer :d. Image/JPEG The correct is d 563. The purpose of the UA is _______. a. Message preparation b. Envelope creation c. Transferral of messages across the Internet answer :d. (a) and (b) The correct is d 564. The _______ field in the MIME header is the type of data and the body of th e message. a. Content-Id b. Content-description answer :c. Content-type d. Content-transfer-encoding The correct is c 565. A message is fragmented into three email messages. What is the content-type ? answer :a. Message/partial b. Multipart/partial c. Multipart/mixed d. Message/RFC822 The correct is a 566. A client machine usually needs _______ to send email. a. Only POP b. Both SMTP and POP answer :c. Only SMTP d. None of the above The correct is c 567. In FTP, what attributes must be defined by the client prior to transmission ? a. Data type b. File structure c. Transmission mode answer :d. All the above The correct is d 568. In FTP, there are three types of _______: stream, block, and compressed. a. Data structures answer :b. Transmission modes c. Files d. All the above The correct is b 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. a. Data structure b. Transmission mode answer :c. File type d. All the above The correct is c 570. In FTP, when you _______, it is copied from the server to the client.

a. Retrieve a file b. Store a file c. Retrieve a list answer :d. (a) and (c) The correct is d 571. In FTP, when you _______, it is copied from the client to the server. a. Retrieve a file answer :b. Store a file c. Retrieve a list d. (a) and (c) The correct is b 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? a. Multipart/digest b. Multipart/alternative c. Multipart/mixed answer :d. Multipart/parallel The correct is d 573. During an FTP session the data connection is opened _______. a. Exactly once b. Exactly twice answer :c. As many times as necessary d. All the above The correct is c 574. Which of the following is a retrieval method? a. HTTP b. FTP c. TELNET answer :d. All the above The correct is d 575. A request message always contains _______. a. A status line, a header, and a body b. A status line and a header c. A header and a body answer :d. A request line and a header The correct is d 576. Which of the following is present in both a request line and a status line? a. URL b. Status code answer :c. HTTP version number d. Status phrase The correct is c 577. Which of the following is not a client program in WWW? a. FTP b. HTTP answer :c. HTML d. TELNET The correct is c 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. answer :a. PUT b. GET

c. POST d. COPY The correct is a 579. The _______ header can specify the client configuration and the client's pr eferred document format. answer :a. Request b. Response c. General d. Entity The correct is a 580. The _______ tags enclose binary code or byte code. answer :a. Executable contents b. Image c. List d. Hyperlink The correct is a 581. Which type of Web document is run at the client site? a. Dynamic answer :b. Active c. Static d. All the above The correct is b 582. HTTP has similarities to both _______ and _______. a. FTP; MTV b. FTP; URL c. FTP; SNMP answer :d. FTP; SMTP The correct is d 583. A user needs to send the server some information. The request line method i s ______. a. OPTION answer :b. POST c. PATCH d. MOVE The correct is b 584. A response message always contains _______. a. A header and a body b. A status line, a header, and a body answer :c. A request line and a header d. A status line and a header The correct is c 585. The _______ header supplies information about the body of a document. a. General b. Request answer :c. Entity d. Response The correct is c 586. The _______ header can specify the server configuration or provide informat ion about a request. a. General b. Request answer :c. Response

d. Entity The correct is c 587. Hypertext documents are linked through _______. a. TELNET answer :b. Pointers c. DNS d. Homepages The correct is b 588. Which of the following is an interpreter? a. CGI b. FTP c. HTTP answer :d. HTML The correct is d 589. What are the components of a browser? answer :a. Controller, client program, interpreter b. Retrieval method, host computer, path name c. Hypertext, hypermedia, HTML d. All the above The correct is a 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. answer :a. GET b. HEAD c. POST d. PUT The correct is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? a. Dynamic b. Active answer :c. Static d. All the above The correct is c 592. The _______ of a Web page contains the title and parameters used by the bro wser. a. Attributes b. Tags answer :c. Head d. Body The correct is c 593. Which type of Web document is created at the server site only when requeste d by a client? a. Active b. Static answer :c. Dynamic d. All the above The correct is c 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. a. The head b. The body c. A tag

answer :d. An attribute The correct is d 595. A user wants to copy a file to another location; the request line contains the _______ method. a. PUT b. PATCH answer :c. COPY d. POST The correct is c 596. What does the URL need to access a document? a. Path name b. Host computer c. Retrieval method answer :d. All the above The correct is d 597. Which type of Web document is transported from the server to the client in binary form? answer :a. Active b. Static c. Dynamic d. All the above The correct is a 598. An ending tag is usually of the form _______ a. <tagname> b. <tagname!> answer :c. </tagname> The correct is c 599. An applet is a small application program written in _______ a. Shell script answer :b. Java c. C d. C++ The correct is b 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. a. Passive answer :b. Dynamic c. Active d. Static The correct is b 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. a. Passive answer :b. Dynamic c. Active d. Static The correct is b 602. A user needs to move a file to another location. The request line method is _______. a. PATCH answer :b. MOVE c. PUT

d. GET The correct is b 603. Which category of HTML tags allows the listing of documents? a. Image b. Hyperlink answer :c. List d. Executable contents The correct is c 604. A program can use _______ to write a CGI program. a. Bourne shell script b. Perl c. C answer :d. Any of the above The correct is d 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. a. Passive b. Dynamic c. Active answer :d. Static The correct is d 606. The server receives input from a browser through _______. a. An attribute answer :b. A form c. A tag d. Any of the above The correct is b 607. Output from a CGI program is _______. a. Text b. Graphics c. Binary data answer :d. Any of the above The correct is d 608. _______ is used to enable the use of active documents. a. CGI b. Java answer :c. HTML d. All the above The correct is c 609. Java is _______. a. A programming language b. A run-time environment c. A class library answer :d. All the above The correct is d 610. An applet is _______ document application program. answer :a. An active b. A passive c. A static d. A dynamic The correct is a

611. In a real-time video conference, data from the server are _______ to the cl ient sites. a. Unicast b. Broadcast answer :c. Multicast d. None of the above The correct is c 612. A _______ adds signals from different sources to create a single signal. answer :a. Mixer b. Translator c. Timestamp d. Sequence number The correct is a 613. The RTCP _______ message shuts down a stream. a. Application-specific b. Source description answer :c. Bye d. Farewell The correct is c 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. a. SIP answer :b. H.323 c. IEEE 802.3 d. V.90bis The correct is b 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. a. Timestamp b. Sequence number c. Mixer answer :d. Translator The correct is d 616. An RTP packet is encapsulated in a(n) _______. a. IP datagram b. RTCP packet answer :c. UDP user datagram d. TCP segment The correct is c 617. The last step in JPEG, _______, removes redundancies. a. Blocking answer :b. Compression c. Quantization d. Vectorization The correct is b 618. A _______ shows when a packet was produced relative to the first or previou s packet. a. Sequence number b. Threshold answer :c. Timestamp d. Playback buffer The correct is c

619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). a. H.245 b. H.225 c. H.323 answer :d. Q.931 The correct is d 620. TCP is not suitable for real-time traffic because _______. a. There is no provision for timestamping b. There is no support for multicasting c. Missing packets are retransmitted answer :d. All the above The correct is d 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. a. Quantization b. Vectorization c. Blocking answer :d. The DCT The correct is d 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. a. Sender b. QoS answer :c. Receiver d. Passive The correct is c 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. a. DCT answer :b. SIP c. RTCP d. JPEG The correct is b 624. For streaming stored audio/video, the _______ holds information about the a udio video file. a. Jitter b. Alpha file c. Beta file answer :d. Metafile The correct is d 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. a. TCP/IP answer :b. RTSP c. HTTP d. SIP The correct is b 626. The audio/video stream is sent by the media server to the _______. answer :a. Media player b. Browser c. Web server d. None of the above

The correct is a 627. Voice over IP is a(n) ________ audio/video application. answer :a. Interactive b. Streaming stored c. Streaming live d. None of the above The correct is a 628. _______ is a SIP message type. a. INVITE b. CANCEL c. OPTIONS answer :d. All the above The correct is d 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. a. Proxy server b. Registrar server c. Media server answer :d. (a) and (b) The correct is d 630. _______ are used to number the packets of a real-time transmission. a. Translators b. Timestamps c. Playback buffers answer :d. Sequence numbers The correct is d 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. a. CVF b. CSM answer :c. ECB mode d. CBC mode The correct is c 632. In the public-key method of cryptography, which key is publicly known? answer :a. Encryption key only b. Decryption key only c. Both d. None of the above The correct is a 633. A cipher is _______. a. An encryption algorithm b. A decryption algorithm c. A private key answer :d. (a) or (b) The correct is d 634. Before a message is encrypted, it is called _______. a. Ciphertext b. Cryptotext c. Cryptonite answer :d. Plaintext The correct is d

635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. answer :a. 190 b. 200 c. 19 d. 20 The correct is a 636. The _______ is an example of polyalphabetic substitution. a. P-box answer :b. Vigenere cipher c. S-box d. Product block The correct is b 637. In the symmetric-key method of cryptography, which key is publicly known? a. Encryption key only b. Decryption key only c. Both answer :d. None of the above The correct is d 638. The RSA algorithm uses a _______ cryptography method. a. Private-key b. Symmetric-key c. Denominational answer :d. Public-key The correct is d 639. The _______ is a block cipher. a. P-box b. S-box c. Product block answer :d. All the above The correct is d 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. a. Monoalphabetic substitution b. Transposition answer :c. Polyalphabetic substitution d. None of the above The correct is c 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. a. ECB mode b. CBC mode c. CFM answer :d. All the above The correct is d 642. An initialization vector is needed in the _______. a. CSM b. CBC mode c. CVF answer :d. (a) and (b) The correct is d 643. In the public-key method of cryptography, only the receiver has possession

of the _______. a. Public key b. Both keys answer :c. Private key d. None of the above The correct is c 644. After a message is decrypted, it is called _______. a. Ciphertext b. Cryptotext c. Cryptonite answer :d. Plaintext The correct is d 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. a. Polyalphabetic substitution b. Transpositional answer :c. Monoalphabetic substitution d. None of the above The correct is c 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. a. KDC answer :b. X.509 c. CA level 1 d. Kerberos The correct is b 647. Windows 2000 uses an authentication protocol called _______. a. Otway-Rees answer :b. Kerberos c. Diffie-Hellman d. Needham-Schroeder The correct is b 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. a. His or her own public key answer :b. His or her own private key c. His or her own symmetric key d. The receiver's private key The correct is b 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. a. TLS b. Firewall c. CA answer :d. KDC The correct is d 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. a. Return answer :b. Replay c. Man-in-the-middle d. Bucket brigade The correct is b

651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. answer :a. Needham-Schroeder b. Diffie-Hellman c. Otway-Rees d. Kerberos The correct is a 652. If user A wants to send an encrypted message to user B, the plaintext is en crypted with the public key of _______. a. The network b. User A answer :c. User B d. (a) or (b) The correct is c 653. When symmetric-key encryption is combined with private-key encryption, the _______ key is encrypted with the public key. a. Skeleton b. Private c. Public answer :d. Symmetric The correct is d 654. The _______ issues tickets for the real server. a. Real server b. Data server answer :c. AS d. TGS The correct is c 655. In _______-key cryptography, everyone has access to all the public keys. a. Private b. Certified answer :c. Symmetric d. Public The correct is c 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. answer :a. The sender's public key b. Her or his own symmetric key c. Her or his own private key d. Her or his own public key The correct is a 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. a. Ticket b. Realm answer :c. Nonce d. Public key The correct is c 658. A _______ certifies the binding between a public key and its owner. a. KDC b. TLS answer :c. CA d. Firewall

The correct is c 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. a. 90 b. 10 c. 20 answer :d. 45 The correct is d 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. a. Needham-Schroeder b. Otway-Rees answer :c. Diffie-Hellman d. Kerberos The correct is c 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. a. Bucket-in-the-middle b. Replay c. Return answer :d. Man-in-the-middle The correct is d 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. a. PKI b. TGS answer :c. KDC d. CA The correct is c 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. a. Needham-Schroeder b. Diffie-Hellman c. Otway-Rees answer :d. Kerberos The correct is d 664. The _______ is the KDC in the Kerberos protocol. a. Real server b. Data server answer :c. AS d. TGS The correct is c 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. a. Authentication data answer :b. SPI c. Padding d. Sequence number The correct is b 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. a. Encapsulated in another datagram; encrypted

answer :b. Encrypted; encapsulated in another datagram c. Authenticated; encrypted d. Encrypted; authenticated The correct is b 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. a. PGP b. ESP c. IPSec answer :d. AH The correct is d 668. An _______ is a private network with no external access that uses the TCP/I P suite. a. Internet answer :b. Intranet c. internet d. Extranet The correct is b 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. a. PGP b. TLS c. AH answer :d. SA The correct is d 670. An _______ is a private network with limited external access that uses the TCP/IP suite. a. Intranet answer :b. Extranet c. Internet d. internet The correct is b 671. The handshake protocol and data exchange protocol are part of _______. answer :a. TLS b. CA c. KDC d. SSH The correct is a 672. _______ is a collection of protocols that provide security at the IP layer level. a. TLS b. SSH answer :c. IPSec d. PGP The correct is c 673. A method to provide for the secure transport of email is called _______. a. TLS answer :b. PGP c. SA d. IPSec The correct is b 674. A VPN uses _______ to guarantee privacy.

a. IPSec b. Tunneling answer :c. Both (a) and (b) d. None of the above The correct is c 675. A _______ can forward or block messages based on the information in the mes sage itself. a. Message digest answer :b. Proxy firewall c. Packet-filter firewall d. Private key The correct is b 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. a. AH b. PGP c. IPSec answer :d. ESP The correct is d 677. _______ is a transport layer security protocol. a. PGP b. IPSec answer :c. TLS d. AH The correct is c 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. answer :a. Protocol b. Security parameter index c. Sequence number d. Next-header The correct is a 679. A _______ network is totally isolated from the global Internet. answer :a. Private b. Hybrid c. Virtual private d. Any of the above The correct is a 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. a. Private answer :b. Hybrid c. Virtual private d. Any of the above The correct is b 681. In a VPN, _______ encrypted. a. The inner datagram is b. Neither the inner nor the outer datagram is c. The outer datagram is answer :d. Both inner and outer datagrams are The correct is d 682. A _______ can forward or block packets based on the information in the netw

ork layer and transport layer headers. a. Proxy firewall b. Message digest answer :c. Packet-filter firewall d. Private key The correct is c 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer :Default gateway 2. Why was the OSI model developed? Answer :standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer :DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer :bits 5. Which protocol below operates at the network layer in the OSI model? Answer :All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer :removed 7. Session layer of the OSI model provides Answer :Dialog control 8. IPv6 has _______ -bit addresses. Answer :128 9. Which one of the following functionalities isn\'t provided by TCP? Answer :Addressing 10. Which of the following can be an Ethernet physical address? Answer :07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer :32 1. The maximum number of nodes per segment depends on the_______.? Answer :Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer :Two 3. IEEE designates Thicknetas_______Ethernet Answer : 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer :Protocol 5. Which is not an exmple of transmission media? Answer :None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer :Heavy use 7. How many layers in the OSI model? Answer :7 8. Which device act as a traffic cop? Answer :Router 9. What is SMTP? Answer :Simple mail transport protocol 10. An organization that share devices, saves Answer :All of the above. 11. The computer you are controlling or working via a network. Answer :remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer :Peer-to-Peer network

13. What layer of OSI does the encryption/decryption? Answer :Presentaion layer 14. E-mail use communication protocol. Answer :SMTP 15. What is the default port number for SMTP? Answer :25 16. What is the default port number for FTP? Answer : 21 17. What is the default port number for Web server such as IIS and Apache? Answer :80 18. HTTP is the protocol use to view web pages. Answer :True 19. Which cannot support full-duplexing? Answer :100BaseT4 20. Vertical connectors between floors are known as_______. Answer :Riser The _______ defines the client program. Answer :A) B) C) Well-known port number

Ephemeral port number IP address

D) Physical address 2 INCORRECT The _______ timer is used in the termination phase. Answer :A) B) C) Retransmission

Time-waited Persistence

D) Keep-alive 3 INCORRECT Which is a legal port address? A) B) 0 513 65,535

Answer :C)

D) All the above 4 INCORRECT The definition of reliable delivery includes _______. A) B) Error-free delivery Receipt of the complete message

Answer :C)

In-order delivery

D) All the above 5 INCORRECT Which of the following does UDP guarantee? A) B) Acknowledgments to the sender Flow control Sequence numbers on each user datagram

Answer :C)

D) None of the above 6 INCORRECT The source port address on the UDP user datagram header defines _______. A) B) The sending computer The receiving computer The application program on the receiving computer

Answer :C)

D) The application program on the sending computer 7 INCORRECT A host can be identified by _______ while a program running on the host can be identified by _______. Answer :A) B) C) A port number; an IP address

An IP address; a port number An IP address; a host address

D) An IP address; a well-known port 8 INCORRECT Which of the following is not part of the UDP user datagram hea der? A) Source port address Checksum

Answer :B) C)

Length of header

D) Destination port address 9 INCORRECT The _______ defines the server program. Answer :A) IP address

B) C)

Well-known port number Ephemeral port number

D) Physical address 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer :A) B) C) Process-to-process; node-to-node

Host-to-host; process-to-process Process-to-process; host-to-host

D) Node-to-node; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer :A) B) C) Persistence

Keep-alive Retransmission

D) Time-waited 12 CORRECT Connection establishment involves a _______ handshake. Answer :A) B) C) One-way Two-way Three-way

D) None of the above 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer :A) B) C) D) Persistence

Transmission Keep-alive Time-waited

14 INCORRECT The _______ address uniquely identifies a running application program. A) IP address NIC

Answer :B) C) Socket

D) Host 15 INCORRECT The _______ field is used to order packets of a message. A) B) Sequence number Acknowledgment number Urgent pointer

Answer :C)

D) Checksum 16 INCORRECT The _______ field is used for error detection. A) B) Sequence number Acknowledgment number Urgent pointer

Answer :C)

D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer :A) B) C) 6 8 4

D) 2 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. Answer :A) B) C) Control Offset Sequence number

D) Reserved 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer : B) C) A) Silly window syndrome

Sliding window syndrome Nagle's syndrome

D) Delayed acknowledgment 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer :A) B) C) Time-waited

Retransmission Persistence

D) Keep-alive 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. A) B) Clark's solution Nagle's algorithm Delayed acknowledgment

Answer :C)

D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer :A) B) C) Nagle's algorithm

Clark's solution Delayed acknowledgment

D) (a) or (c) 23 INCORRECT An ACK number of 1000 always means that _______. A) 999 bytes has been successfully received

B) Answer :

1000 bytes has been successfully received C) 1001 bytes has been successfully received

D) None of the above 25 INCORRECT UDP and TCP are both _______ layer protocols. A) B) Physical Data link Network

Answer :C)

D) Transport 26 INCORRECT Which of the following functions does UDP perform? Answer :A) B) C) End-to-end reliable data delivery

Process-to-process communication Host-to-host communication

D) All the above 27 INCORRECT UDP needs the _______ address to deliver the user datagram to the correct application program. A) B) Application Internet Physical

Answer :C)

D) Port 28 INCORRECT Karn's algorithm is used in calculations by the _______ timer. Answer :A) B) C) D) Time-waited

Retransmission Persistence Keep-alive

1. Which piece of software allows the computer s operating system to access the NI

C hardware? Answer :NIC driver Operating system driver System driver Protocol driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? CPU Software driver ISA interface Answer :EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer :UTP Twinax Fiber-optic Coax 4. You are running UTP cable in an Ethernet network from a workstation to a hub. Wh ich of the following items is/are included in the total length measurement of th e cable segment (as needed in determining the longest segment length)? (Choose a ll that apply.) Answer :Workstation patch cable Answer :Main cable run Hub internal network Answer :Hub patch cable 5. If you were going to make a 10BaseT patch cable, which tool would you use? Screwdriver Punchdown tool Answer :Wire crimper Tone generator 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) BNC Answer :DB-25 Answer :Centronics-50 RJ-11 IBM Data Connector 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? netstat Answer :MSD Ping utility All of the above 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Bridge Router

Answer :Repeater Brouter 9. A bridge can increase network efficiency by _____________________. Copying packets of data sent to storage and resending them as requested without rereading the needed data Answer :Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment Defining traffic order by using Quality of Service (QoS) All of the above 10. What is the result of updating an old NIC driver on a system? Answer :It can correct bugs. It can be a good way to look like you are doing useful work. It can act as a protocol converter. All of the above. 11. EEPROM is short for ________________________________________. Electronically erasable programmable read-only memory Answer :Electrically erasable programmable read-only memory Electronically erasable periodical only memory Electrically erasable powered read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. PCI Token Ring Answer :Legacy ISA EISA 13. A brouter combines which functions? (Choose all that apply.) Answer :Router Answer :Bridge Gateway Repeater 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? RJ-11 Answer :BNC RJ-45 All of the above 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Wire crimper Punchdown tool Media tester Answer :Tone generator/tone locator 16.

You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? UTP STP Answer :Coax Fiber-optic 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer :Print server Print facilitator PCONSOLE.EXE Print manager 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Surge Answer :Spike Brownout Blackout 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer :Surge Spike Brownout Blackout 20. Which power condition occurs when the voltage level drops below 120 volts and st ays below for an extended period of time? Surge Spike Answer :Brownout Blackout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) It has centralized security and administration. Answer :A computer can be both a client and a server. Answer :A limited number of computers are involved. It does not require a hub. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. RG-47 Answer :RG-58 RG-59 RG-62 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) It does not require a hub. A computer can be both a client and a server. Answer :It has centralized security and administration. Answer :It has a centralized backup. 4. A network that uses 10Base2 requires ___________________ terminators for

each network segment in order to function correctly. 0 1 Answer :2 3 5. Which of the following is characteristic of a mesh network? It controls cable costs. Answer :It offers improved reliability. It is required by fire code. It needs a token to operate. 6. Which type of network topology uses terminators? Star Answer :Bus Ring Mesh 7. Which of the following best describes a star topology? Answer :It has centralized management. Any cable fault halts all network traffic. It uses less cable than a bus or ring. It is always completely wireless. 8. A client/server approach uses what type of security model? Answer :Centralized Decentralized Server Distributed 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Screws DIX Answer :Vampire Taps Bolts 10. Plenum cable has which of the following characteristics? It has a lower cost than PVC. Answer :It meets fire codes. It transmits data faster. All the above. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? STP Answer :UTP Coax Fiber-optic 12. Which of the following has the highest possible throughput? STP UTP Coax Answer :Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? 100BaseVG 10BaseF 100BaseT4 Answer :100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Duplex communications Baseband communications Sideband communications Answer :Broadband communications

15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? NAS devices have smaller monitors. Answer :NAS devices are less expensive. NAS devices contain more storage. All the above. 16. An RJ-45 connector should be wired with ____________________ pairs when used on a Category 5 UTP cable. 1 2 Answer :4 8 17. Thicknet can be extended to ___________________ meters per segment. 100 200 Answer :500 1000 18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Gateway T1 modem Answer :CSU/DSU Switch 19. Failure to terminate a bus topology properly will result in _________. Electrical shock hazard Answer :Unwanted signal echo Fire hazard All the above 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Router Answer :NIC Gateway BNC connector In OSI model, as data packet moves from the lower to the upper layer header are.. Answer :Removed There are two broad classes of packet-switched networks are: Answer :datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer :Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer :Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer :Virtual-circuit network Answer :Datagram network Which statement is correct for layering in OSI model Answer :Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer :TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer :Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer :Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b

its/sec; the transmission delay is Answer :L/R Which one is correct about P2P network? Answer :A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer :TCP _____ provides reliable, in-order transfer of bytes between client and server Answer :TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer :Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer :The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer :All of the other SMTP stands for Answer :Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer :TCP . 20 and 21 IMAP and POP are_________ Answer :Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer :MIME TCP provides __________between application processes running on different hosts Answer :Logical communications What is WRONG about UDP? Answer :Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer :Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer :Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer :136 Which one is correct about TCP and UDP? Answer :TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer :FIN The difference between flow control and congestion control is primarily Answer :One is to avoid overflowing the receiver s buffer; one is to avoid congest ion of the channel TCP is a ___________ protocol. Answer :Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer :First What is the data unit used in Internet Protocol (IP)? Answer :Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer :Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an

d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer :32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer :All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer :2 Traceroute command uses Answer :ICMP RIP (Routing Information Protocol) in the Internet uses Answer :Distance vector routing algorithm Routers operate in the _______ layers. Answer :network Dijkstra s algorithm is Answer :A link-state routing algorithm Distance vector routing algorithm requires Answer :all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer :0000 ______ is (are) (an) example(s) of random access MAC Answer :All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer :the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer :Wireless LAN What is store-and-forward operation in switches? Answer :They receive the whole frame before forwarding to next station ______is used in Ethernet Answer :CSMA/CD Which one is the flag used for framing in PPP Answer :01111110 Which one can be a MAC address? Answer :00-D0-56-F2-B5-12 ARP stands for _________ Answer :Address Resolution Protocol Parity checking _____. Answer :can detect a single bit error in a transmission At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer :0s are a CRC remainder is What type of routing algorithm that OSPF use? Answer :Shortest Path Routing Multicast Routing Distance Vector Routing Link State Routing The bytes of data being transferred in each connection are numbered by TCP. The number starts with a none is correct answer :randomly generated number 1 0

The ___ model shows how the network functions of a computer ought to be organize d. Answer :OSI CCITT ANSI ISO ___ audio/video refers to on-demand request for compressed audio/video files. Answer :Streaming live Interactive None is correct Streaming stored The physical layer is concerned with the movement of ___ over the physical mediu m. protocols dialogs answer :bits programs What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? OSPF IGRP Answer :DHCP HTTP If ASCII character H is sent and the character I is received, what type of error s is this? burst single-bit recoverable answer :multiple-bit HDLC is a ___ protocol character-oriented count-oriented byte-oriented answer :bit-oriented An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? 18.874 sec 1.887 sec 337 sec answer :18874 sec What flag is used to close TCP connection? Answer :FIN SYN ACK PSH What type of routing protocol that BGP is? Link State Routing Shortest Path Routing Multicast Routing Answer :Distance Vector Routing A bridge has access to the ___ address of a station on the same network.

port physical answer :none is correct logical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer :none is correct physical network transport With WWW as an example of client-server computer software, the client is: all are correct answer :The machine that you use to display WWW documents The machine that you use to store WWW documents The machine that makes WWW documents available Routers function in the ___ layers. none is correct physical and data link data link and network answer :physical, data link, and network The purpose of MTA is Message preparation Envelope creation Answer :Transferal of message across the Internet a and b A ___ document is created by a Web server whenever a browser requests the docume nt dynamic static answer :Active None is correct What type of service that VC network provides? Answer :Connection-oriented Connectionless Connection-oriented and Connectionless None is correct A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer :6.5% 13.1% 2.6% 0.8% ___ is more powerful and complex than ___ Answer :IMAP4; POP3 POP3; IMAP4 SMTP; POP3 None is correct TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. message; message none is correct

block; block answer :stream; stream TCP uses ___ to check the safe and sound arrival of data. out of band signaling none is correct the services of another protocol answer :an acknowledgment mechanism In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are___ rearranged modified added answer :removed Which IP option is used if exactly four specific router are to be visited by the datagram? record route answer :strict source route loose source route none is correct What is the service that the UDP protocol provides? Answer :guaranteed delivery error detection none is correct flow control In the OSI model, encryption and decryption are function of the ___ layer. session application answer :presentation transport Which device can amplify and make free- noise signal to all computer in LAN? router repeater answer :all three devices switch What is information used to route packet in network? Answer :destination address and source address fields in IP header source address field in IP header destination addressfield in IP header destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___ speeds up the slower process none is correct slows down the faster process answer :uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. 10BASE-T 10BASE5 10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is circuit-switched one is Network Layer, one is Transport Layer one is Transport Layer, one is Session Layer answer :one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a variable-length block none is correct answer :a fixed number of blocks

a fixed-length In ___ resolution, the resolver expects the server to supply the final . none is correct straight answer :recursive iterative By default, FTP uses which ports? 25 and 110 80 and 81 20 and 21 Answer :80 and 8080 Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? ITU-T Answer :EIA ANSI ISO In the OSI model, which layer functions as a liaison between user support layers and network support layers? Physical layer Network layer Answer :Transport layer Session layer The Physical layer is connected with the movement of____over the physical medium . Answer :Bits Dialogs Protocols Programs Which of the following statement is correct? Full-Duplex: Communications that can go only one direction Answer :Full-Duplex: Communications in which both sender and receiver can send a t the same time Half-Duplex: Communications in which both sender and receiver can send at the sa me time Half-Duplex: Communications that can go only one direction What is the purpose of the IEEE 802 commitlee? Answer :To develop LAN standards To define some protocols for routing To develop IPv6 standard layers for internetworking connection To define seven standard layers for internetwork connection MAN stands for? Multi-Access Network Major Area Network Metropolitan Area Network Multi-Access Node In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Added Answer :Removed Rearranged Modified Which of the following is an appropriate description concerning B2C? Answer :Ordering books online Government distributing tax forms electronically File sharing Car manufacturer ordering tires from supplier Which of the following is an appropriate description concerning mobile network u

sers? Answer :A notebook computer used in a class Desktop computers in offices Server computers in ISP Networks in order, unwired buildings In the OSI model, encryption and decryption are functions of the_____layer. Application Session Transport Answer :Presentation Quiz Chapter3 If ASCII character G is sent and the character D is received, what type of error is this? Recoverable Single-bit Multiple-bit Answer :Burst The purpose of ICMP echo request end ICMP echo reply is to . Answer :report errors in the resource records of DNS, which record is also known as an alias hostname? Answer :CNAME record Which of the following is characteristic of packet switching? Answer :Bandwidth shared. How does the HTTP protocol implement caching? Answer :using proxy server. What begins an Ethernet frame? Answer :Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer :All of the others What is information in IP header used to route packet in router? Answer :Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer :ICMP messages Which of the following is the MAC protocol? Answer :CSMA/CD The signaling protocol is used in: Answer :Internet The HTTP request line contains a method to request a document from the server. Answer :GET Which of the following is the pipelining protocol: Answer :Automatic Repeat Request An HTTP request message always contains . Answer :a request line and a header With the following Manchester encoding, the bit stream transmitted is ___

Answer :10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer :CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer :Transport layer. How many duplicate ack-numbers triggartha Fast Retransmission mode? Answer :No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer :Multiple channels Which of the following describe the DHCP Discover message? Answer :It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer :Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer :F The default mode of HTTP 1.1 is ___ Answer :Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer :process identifier The receiver window is found in ____ Answer :only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer :165 What is the name of the packets processed at the network layer? Answer :Datagram Which of the following is hybrid of client-server and P2P? Answer :Skype What is the protocol used to obtain email from to an email server: Answer :IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer :Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer :MX record What is the MAC protocol used in 802.11 network? Answer :CSMA/CA

when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer :retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer :129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer :no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer :201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer :CSMA/CD Your normal PC requests a DNS to do a search: Answer :recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer :authoritative A switch processes up to which layer? Answer :Transport ______ uses dedicated links directly connected from end-to-end Answer :Circuit switched network Suppose that host 10.0.0.2 initiates a connection, using source port 5500 to a W eb server listening at port 80 at 128.119.40.186. The NAT translation table for this TCP connection. WAN side LAN side 138.76.29.7, 5002 10.0.0.2, 5500 What are the destination IP addresses and port numbers on the IP datagram arrivi ng to the WAN side of the router with interface address 138.76.29.7? Answer :Destination IP: 128.119.40.186, Destination Port: 80. This command identifies the receiver cf the message. Answer :RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . answer :this is the last fragment. Which of the following is NOT a message of DHCP? Answer :DHCP response Which of the following is the service of link layer'? Answer :Error detection which the following is the individual characteristic of rdt3.0? answer :Sequence number added to packet. An process-to-process communication up to which layer? Answer :Transport Which the following is the individual characteristic of switch? Answer :Maintain a routing table.

Which transport layer was first used for streaming media? Answer :UDP Most Internet services and intelligence is located: Answer :in ISPs The backbone ofthe Internet is run by: Answer :Tier-1 ISPs The core of the Internet consiste of: Answer :Ethernet What is the function of ARP? Answer :It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer :Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 10010101 and 10101010. Answer :00111111 What is the framming method used in PPP? Answer :Byte stuffing UDP is called a __________ transport protocol. Answer :connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer :011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer :UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer :The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer :Streaming live The second phase of JPEG is_______ Answer :Quantization In the DNS, the names are defined in structure Answer :an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer :32 subnets and 8 hosts In ______ resolution, the resolver expects the server to supply the final Answer :Recursive

What is the combination of an iP address and a port number called? Answer :A socket NAT used at the router to Answer :translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer :Faster than the TCP In the OSI model, which of the following is an application layer service? Answer :all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer :Control What are general functions of router? Answer :All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer :uses buffers A user needs to send the server some information. The request line method is__ Answer :POST The purpose of MTA (Mail Transfer Agent) is Answer :Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer :base64 NAT table in router Answer :Store pairs of the IP address of the host with the port number in form o f (IP address, port Answer:) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer :TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer :the original sender Whic h of the following statement is correct? Answer :Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer :Time-to-Live (TTL) What does NAT stand for? Answer :Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer :Port number Jitter is introduced in real-time data by the_____

Answer :Difference of the delay among packets Bridges work in the layers. Answer :physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer :2,6% What is the data unit used in Internet Protocol (IP)? Answer :Datagram An HTTP request message always contains________ Answer :a request line and a header DNS can use the services of _____ using the well-known port 53, Answer :UDP The _____domains define registered hosts according to their generic behavior, Answer :Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer :First A set of rules which is used by computers to communicate with each other across a network is called___ Answer :Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer :Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer :255.255.255.0 The OSI model consists of ____ layers, Answer :Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer :Reduces to 1 Parity checking____ Answer :can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer :parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer :Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer :None of these Flow control_____ Answer :ensures the sender does not too much data that may overwhelm the receive

r Which ones are correct for Repeaters? Answer :To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer :x^5+x^2+1 This command identifies the sender of the message, Answer :MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer :194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer :The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer :None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer :DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer :0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer : *A. Removed There are two broad classes of packet-switched networks are: Answer : *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer : *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer : *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer : *C. Virtual-circuit network Answer : *E. Datagram network Which statement is correct for layering in OSI model Answer : *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer : * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer : *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer : *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer : *C. L/R Which one is correct about P2P network? Answer : *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80.

Answer : *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer : *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer : *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer : *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer : *E. All of the other SMTP stands for Answer : *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer : *E. TCP . 20 and 21 IMAP and POP are_________ Answer : *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer : *E. MIME TCP provides __________between application processes running on different hosts Answer : *A. Logical communications What is WRONG about UDP? Answer : *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer : *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer : *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer : *C. 136 Which one is correct about TCP and UDP? Answer : *A. TCP is reliable transmission and it has congestion control and flow control while UDP is not What flag is used to close TCP connection? Answer : *A. FIN The difference between flow control and congestion control is primarily Answer : *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer : *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer : *A. First What is the data unit used in Internet Protocol (IP)? Answer : *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer : *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer : *A. 32 subnets and 8 hosts

Why NAT (Network Address Translation) is used? Answer : *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer : *A. 2 Traceroute command uses Answer : *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer : *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer : *A. network Dijkstra s algorithm is Answer : *A. A link-state routing algorithm Distance vector routing algorithm requires Answer : *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer : *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer : *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer : *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer : *D. Wireless LAN What is store-and-forward operation in switches? Answer : *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer : *A. CSMA/CD Which one is the flag used for framing in PPP Answer : *B. 01111110 Which one can be a MAC address? Answer : *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer : *A. Address Resolution Protocol Parity checking _____. Answer :*A. can detect a single bit error in a transmission At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is What type of routing algorithm that OSPF use? Answer: Shortest Path Routing Multicast Routing Distance Vector Routing Link State Routing The bytes of data being transferred in each connection are numbered by TCP. The number starts with a none is correct Answer: randomly generated number 1 0 The ___ model shows how the network functions of a computer ought to be organize d.

Answer: OSI CCITT ANSI ISO ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Streaming live Interactive None is correct Streaming stored The physical layer is concerned with the movement of ___ over the physical mediu m. protocols dialogs Answer: bits programs What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? OSPF IGRP Answer: DHCP HTTP If ASCII character H is sent and the character I is received, what type of error s is this? burst single-bit recoverable Answer: multiple-bit HDLC is a ___ protocol character-oriented count-oriented byte-oriented Answer: bit-oriented An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? 18.874 sec 1.887 sec 337 sec Answer: 18874 sec What flag is used to close TCP connection? Answer: FIN SYN ACK PSH What type of routing protocol that BGP is? Link State Routing Shortest Path Routing Multicast Routing Answer: Distance Vector Routing A bridge has access to the ___ address of a station on the same network. port physical

Answer: none is correct logical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: none is correct physical network transport With WWW as an example of client-server computer software, the client is: all are correct Answer: The machine that you use to display WWW documents The machine that you use to store WWW documents The machine that makes WWW documents available Routers function in the ___ layers. none is correct physical and data link data link and network Answer: physical, data link, and network The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet a and b A ___ document is created by a Web server whenever a browser requests the docume nt dynamic static Answer: Active None is correct What type of service that VC network provides? Answer: Connection-oriented Connectionless Connection-oriented and Connectionless None is correct A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 13.1% 2.6% 0.8% ___ is more powerful and complex than ___ Answer: IMAP4; POP3 POP3; IMAP4 SMTP; POP3 None is correct TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. message; message none is correct block; block Answer: stream; stream

TCP uses ___ to check the safe and sound arrival of data. out of band signaling none is correct the services of another protocol Answer: an acknowledgment mechanism In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are___ rearranged modified added Answer: removed Which IP option is used if exactly four specific router are to be visited by the datagram? record route Answer: strict source route loose source route none is correct What is the service that the UDP protocol provides? Answer: guaranteed delivery error detection none is correct flow control In the OSI model, encryption and decryption are function of the ___ layer. session application Answer: presentation transport Which device can amplify and make free- noise signal to all computer in LAN? router repeater Answer: all three devices switch What is information used to route packet in network? Answer: destination address and source address fields in IP header source address field in IP header destination addressfield in IP header destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___ speeds up the slower process none is correct slows down the faster process Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. 10BASE-T 10BASE5 10BASE2 Answer: None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is circuit-switched one is Network Layer, one is Transport Layer one is Transport Layer, one is Session Layer Answer: one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a variable-length block none is correct Answer: a fixed number of blocks a fixed-length

In ___ resolution, the resolver expects the server to supply the final . none is correct straight Answer: recursive iterative By default, FTP uses which ports? 25 and 110 80 and 81 20 and 21 Answer: 80 and 8080 Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? ITU-T Answer: EIA ANSI ISO In the OSI model, which layer functions as a liaison between user support layers and network support layers? Physical layer Network layer Answer: Transport layer Session layer The Physical layer is connected with the movement of____over the physical medium . Answer: Bits Dialogs Protocols Programs Which of the following statement is correct? Full-Duplex: Communications that can go only one direction Answer: Full-Duplex: Communications in which both sender and receiver can se nd at the same time. Half-Duplex: Communications in which both sender and receiv er can send at the same time Half-Duplex: Communications that can go only one direction What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards To define some protocols for routing To develop IPv6 standard layers for internetworking connection To define seven standard layers for internetwork connection MAN stands for? Multi-Access Network Major Area Network Answer: Metropolitan Area Network Multi-Access Node In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Added Answer: Removed Rearranged Modified Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Government distributing tax forms electronically File sharing Car manufacturer ordering tires from supplier Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class

Desktop computers in offices Server computers in ISP Networks in order, unwired buildings In the OSI model, encryption and decryption are functions of the_____layer. Application Session Transport Presentation Quiz Chapter3 If ASCII character G is sent and the character D is received, what type of error is this? Recoverable Answer: Single-bit Burst At the CRC generate, added the data unit before division process. Answer: 0s are A polynomial is A CRC remainder is 1s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Networking Teminating Authenticating Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Networking Establishing Answer: Authenticating Teminating At the CRC checker,______if the data unit is damaged. A stream of 0s A stream alternating of 0s, 1s A stream of 1s Answer: A nonzero remainder HDLC is a________protocol Byte-oriented Count-oriented Answer: Bit-oriented Character-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit Multiple-bit Burst Recoverable In cyclic redundancy checking, what is CRC The divisor Answer: The remainder The quotient The dividend In sliding window flow control, if the size is 63, what the range sequence numbe rs? 1 to 64 0 to 64 Answer: 0 to 63 1 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct N(S)

N(R) P/F bit 11. G At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is Quiz Chapter4 What device can . Answer: All . Maximun of data flow through in N-port switch (an with L2) Answer: N N-1 N/2 N/4 How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP OSPF HTTP IGRP What is information used to route packet in network? Destination Address, Source Address, and Protocol fields in IP header Source Address fields in IP header Answer: Destination Address fields in IP header Destination Address and Source Address fields in IP header What type of routing algorithm that OSPF use?---------------------------LinkState Routing Multicast Routing Answer: Shortest Path Routing Distance Vector Routing What does the IP header s protocol field identify? The data link layer protocol that will carry the datagram The application that generated the message carried in the datagram Answer: The transport layer protocol that generated the information in the data field The physical layer specification of the network that will carry the datagram What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: All are correct 127.1.2.3 127.0.0.127 127.0.0.1 IP is________datagram protocol Answer: Both a and b

Connectionless Unreliable d.None is correct In classless addressing,_______is assigned to an organization. None is correct A fixed-length A fixed number of blocks Answer: A variable-length block------------------------------------Which layer does ICMP reside in? Network Transport Answer: Physical Data link DHCP is used to: Assign IP ports automatically Assign MAC addresses automatically Assign host names automatically Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP?----------------------------FTP ARP Answer: ICMP DHCP 11. In classless addressing, the ______ is another name for the common part of the address range. A) suffix Answer: prefix C) netid D) none of the above 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct . Answer: suffix B) prefix C) hostid D) none of the above 13 In classless addressing, the prefix length defines the _____________.

A) netid B) hostid Answer: mask D) none of the above 14 The number of addresses assigned to an organization in classless address ing _______. A) can be any number B) must be a multiple of 256 Answer: must be a power of 2 D) none of the above 15 The first address assigned to an organization in classless addressing __ _____. A) must be a power of 4 Answer: must be evenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) none of the above 16 Which address could be the beginning address of a block of 32 classless addresses?

A) B) Answer: D)

2.4.6.5 2.4.6.16 2.4.6.64 none of the above

17 Which address could be the beginning address of a block of 16 classless addresses? A) B) C) Answer: 2.4.6.5 2.4.6.15 2.4.6.62 none of the above

18 Which address could be the beginning address of a block of 256 classless addresses? A) 2.4.6.5 B) 2.4.6.15 Answer: 2.4.6.0 D) none of the above 19. What type of routing protocol that BGP is? a. b. c. LinkState Routing Shortest Path Routing Multicast Routing

Answer: Distance Vector Routing Quiz Chapter6 What is the data unit used in TCP? Packet Answer: Segment Frame Datagram What is the service that the UDP protocol provides? Flow control Answer: Guaranteed delivery Error detection None is correct What flag is used to close TCP connection? PSH ACK SYN Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Speeds up the slower process Slows down the faster process Answer: Uses buffers None is correct The difference between TCP and UDP is primarily One is Network Layer, one is Transport Layer Answer: One is connection-oriented, one is connectionless One is Transport Layer, one is Session Layer One is connection-oriented, one is circuit-switched TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes.

Answer: Stream; stream Block; block None is correct Message; message TCP uses______________to check the safe and sound arrival of data. The services of another protocol Out-of-band signaling None is correct Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable Unreliable None is correct Best-effort delivery What is the combination of an IP address and a port number called? A sequence number A checksum A data offset Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a 1 Answer: Randomly generated number None is correct 0 Quiz Chapter7 ______is used to compress video. Either a or b MPEG Answer: JPEG None is correct According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Three Answer: Two Four None is correct ______is more powerful and complex than______. SMTP; POP3 Answer: IMAP4; POP3 None is correct POP3; IMAP4 What does the URL need to acess a document Pathname Host computer Retrieval method Answer: All are correct The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet A and b A_____document is created by a Web server whenever a browser requests the docume nt. Answer: Static None is correct Dynamic Active With WWW as an example of client-server computer software, the server is: The machine that you use to display WWW documents

The machine that enables you to connect to the Internet Answer: The machine that makes WWW document available All are correct _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored None is correct Streaming live Interactive In______resolution, the resolver expects the server to supply the final . Straight None is correct Iterative Answer: Recursive By default, FTP uses which ports? Answer: 20 and 21 25 and 110 80 and 8080 80 and 81 11 . Currently two message access protocols are available:_____ and_____. a.POP3; IMAP2 b.POP4; MAP1 Answer:.POP3; IMAP4 d.none of the above 12 With WWW as an example of client-server computer software, the client is : a. all are correct

Answer: The machine that you use to display WWW documents c. d. The machine that you use to store WWW documents The machine that makes WWW documents available

Quiz Chapter1 Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? ITU-T Answer: EIA ANSI ISO In the OSI model, which layer functions as a liaison between user support layers and network support layers? Physical layer Network layer Answer: Transport layer Session layer The Physical layer is connected with the movement of____over the physical medium . Answer: Bits Dialogs Protocols Programs Which of the following statement is correct? Full-Duplex: Communications that can go only one direction Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time Half-Duplex: Communications in which both sender and receiver can send at the sa me time

Half-Duplex: Communications that can go only one direction What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards To define some protocols for routing To develop IPv6 standard layers for internetworking connection To define seven standard layers for internetwork connection MAN stands for? Multi-Access Network Major Area Network Metropolitan Area Network Multi-Access Node In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Added Answer: Removed Rearranged Modified Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Government distributing tax forms electronically File sharing Car manufacturer ordering tires from supplier Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class Desktop computers in offices Server computers in ISP Networks in order, unwired buildings In the OSI model, encryption and decryption are functions of the_____layer. Application Session Transport Answer: Presentation Quiz Chapter3 If ASCII character G is sent and the character D is received, what type of error is this? Recoverable Single-bit Multiple-bit Answer: Burst At the CRC generate, added the data unit before division process. Answer: 0s are A polynomial is A CRC remainder is 1s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Networking Teminating Authenticating Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Networking Establishing Answer: Authenticating Teminating At the CRC checker,______if the data unit is damaged. A stream of 0s A stream alternating of 0s, 1s

A stream of 1s Answer: A nonzero remainder HDLC is a________protocol Byte-oriented Count-oriented Answer: Bit-oriented Character-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit Multiple-bit Burst Recoverable In cyclic redundancy checking, what is CRC The divisor Answer: The remainder The quotient The dividend In sliding window flow control, if the size is 63, what the range sequence numbe rs? 1 to 64 0 to 64 Answer: 0 to 63 1 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct N(S) N(R) P/F bit 11. G At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is Quiz Chapter4 What device can . Answer: All . Maximun of data flow through in N-port switch (an with L2) Answer: N N-1 N/2 N/4 How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP

OSPF HTTP IGRP What is information used to route packet in network? Destination Address, Source Address, and Protocol fields in IP header Source Address fields in IP header Answer: Destination Address fields in IP header Destination Address and Source Address fields in IP header What type of routing algorithm that OSPF use?---------------------------LinkState Routing Multicast Routing Answer: Shortest Path Routing Distance Vector Routing What does the IP header s protocol field identify? The data link layer protocol that will carry the datagram The application that generated the message carried in the datagram Answer: The transport layer protocol that generated the information in the data field The physical layer specification of the network that will carry the datagram What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: All are correct 127.1.2.3 127.0.0.127 127.0.0.1 IP is________datagram protocol Answer: Both a and b Connectionless Unreliable d.None is correct In classless addressing,_______is assigned to an organization. None is correct A fixed-length A fixed number of blocks Answer: A variable-length block------------------------------------Which layer does ICMP reside in? Network Transport Answer: Physical Data link DHCP is used to: Assign IP ports automatically Assign MAC addresses automatically Assign host names automatically Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP?----------------------------FTP ARP Answer: ICMP DHCP 11. In classless addressing, the ______ is another name for the common part of the address range. A) suffix Answer: prefix C) netid D) none of the above 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct .

Answer: B) C) D) 13

suffix prefix hostid none of the above

In classless addressing, the prefix length defines the _____________.

A) netid B) hostid Answer: mask D) none of the above 14 The number of addresses assigned to an organization in classless address ing _______. A) can be any number B) must be a multiple of 256 Answer: must be a power of 2 D) none of the above 15 The first address assigned to an organization in classless addressing __ _____. A) must be a power of 4 Answer: must be evenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) none of the above 16 Which address could be the beginning address of a block of 32 classless addresses? A) B) Answer: D) 2.4.6.5 2.4.6.16 2.4.6.64 none of the above

17 Which address could be the beginning address of a block of 16 classless addresses? A) B) C) Answer: 2.4.6.5 2.4.6.15 2.4.6.62 none of the above

18 Which address could be the beginning address of a block of 256 classless addresses? A) 2.4.6.5 B) 2.4.6.15 Answer: 2.4.6.0 D) none of the above 19. What type of routing protocol that BGP is? a. b. c. LinkState Routing Shortest Path Routing Multicast Routing

Answer: Distance Vector Routing Quiz Chapter6 What is the data unit used in TCP?

Packet Answer: Segment Frame Datagram What is the service that the UDP protocol provides? Flow control Answer: Guaranteed delivery Error detection None is correct What flag is used to close TCP connection? PSH ACK SYN Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Speeds up the slower process Slows down the faster process Answer: Uses buffers None is correct The difference between TCP and UDP is primarily One is Network Layer, one is Transport Layer Answer: One is connection-oriented, one is connectionless One is Transport Layer, one is Session Layer One is connection-oriented, one is circuit-switched TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream Block; block None is correct Message; message TCP uses______________to check the safe and sound arrival of data. The services of another protocol Out-of-band signaling None is correct Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable Unreliable None is correct Best-effort delivery What is the combination of an IP address and a port number called? A sequence number A checksum A data offset Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a 1 Answer: Randomly generated number None is correct 0 Quiz Chapter7 ______is used to compress video. Either a or b MPEG Answer: JPEG None is correct According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency.

Three Answer: Two Four None is correct ______is more powerful and complex than______. SMTP; POP3 Answer: IMAP4; POP3 None is correct POP3; IMAP4 What does the URL need to acess a document Pathname Host computer Retrieval method Answer: All are correct The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet A and b A_____document is created by a Web server whenever a browser requests the docume nt. Answer: Static None is correct Dynamic Active With WWW as an example of client-server computer software, the server is: The machine that you use to display WWW documents The machine that enables you to connect to the Internet Answer: The machine that makes WWW document available All are correct _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored None is correct Streaming live Interactive In______resolution, the resolver expects the server to supply the final . Straight None is correct Iterative Answer: Recursive By default, FTP uses which ports? Answer: 20 and 21 25 and 110 80 and 8080 80 and 81 11 . Currently two message access protocols are available:_____ and_____. a.POP3; IMAP2 b.POP4; MAP1 Answer: POP3; IMAP4 d.none of the above 12 With WWW as an example of client-server computer software, the client is : a. all are correct

Answer: The machine that you use to display WWW documents c. d. The machine that you use to store WWW documents The machine that makes WWW documents available

At the CRC generate, ___ added the data unit before division process. 1s are A polynomial is Answer: 0s are a CRC remainder is What type of routing algorithm that OSPF use? Answer: Shortest Path Routing Multicast Routing Distance Vector Routing Link State Routing The bytes of data being transferred in each connection are numbered by TCP. The number starts with a none is correct Answer: randomly generated number 1 0 The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI CCITT ANSI ISO ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Streaming live Interactive None is correct Streaming stored The physical layer is concerned with the movement of ___ over the physical mediu m. protocols dialogs Answer: bits programs What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? OSPF IGRP Answer: DHCP HTTP If ASCII character H is sent and the character I is received, what type of error s is this? burst single-bit recoverable Answer: multiple-bit HDLC is a ___ protocol character-oriented count-oriented byte-oriented Answer: bit-oriented

An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? 18.874 sec 1.887 sec 337 sec Answer: 18874 sec What flag is used to close TCP connection? Answer: FIN SYN ACK PSH What type of routing protocol that BGP is? Link State Routing Shortest Path Routing Multicast Routing Answer: Distance Vector Routing A bridge has access to the ___ address of a station on the same network. port physical Answer: none is correct logical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: none is correct physical network transport With WWW as an example of client-server computer software, the client is: all are correct Answer: The machine that you use to display WWW documents The machine that you use to store WWW documents The machine that makes WWW documents available Routers function in the ___ layers. none is correct physical and data link data link and network Answer: physical, data link, and network The purpose of MTA is Message preparation Envelope creation Answer: Transferal of message across the Internet a and b A ___ document is created by a Web server whenever a browser requests the docume nt dynamic static Answer: Active None is correct What type of service that VC network provides? Answer: Connection-oriented

Connectionless Connection-oriented and Connectionless None is correct A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 13.1% 2.6% 0.8% ___ is more powerful and complex than ___ Answer: IMAP4; POP3 POP3; IMAP4 SMTP; POP3 None is correct TCP allows the sending process to deliver data as a ___ of bytes and allows the receiving process to obtain data as a ___ of bytes. message; message none is correct block; block Answer: stream; stream TCP uses ___ to check the safe and sound arrival of data. out of band signaling none is correct the services of another protocol Answer: an acknowledgment mechanism In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are___ rearranged modified added Answer: removed Which IP option is used if exactly four specific router are to be visited by the datagram? record route Answer: strict source route loose source route none is correct What is the service that the UDP protocol provides? Answer: guaranteed delivery error detection none is correct flow control In the OSI model, encryption and decryption are function of the ___ layer. session application Answer: presentation transport Which device can amplify and make free- noise signal to all computer in LAN? router repeater Answer: all three devices switch What is information used to route packet in network? Answer: destination address and source address fields in IP header source address field in IP header destination addressfield in IP header destination address, source address, and protocol fields in IP header

Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___ speeds up the slower process none is correct slows down the faster process Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. 10BASE-T 10BASE5 10BASE2 None is correct The difference between TCP and UDP is primarily one is connection-oriented, one is circuit-switched one is Network Layer, one is Transport Layer one is Transport Layer, one is Session Layer Answer: one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a variable-length block none is correct Answer: a fixed number of blocks a fixed-length In ___ resolution, the resolver expects the server to supply the final . none is correct straight Answer: recursive iterative By default, FTP uses which ports? 25 and 110 80 and 81 20 and 21 Answer: 80 and 8080

CCNA 1 Chapter 1: Computing Basics Question 1: b What is NIC? A WAN adapter Answer: A printed circuit board that provides network communication A card uses only for Etherner networks A standardized datalink layer address Question 2: c What must computers on a network have in common in order to directly communicate with each other? Use the same operating system Use the same hardware Answer: Use the same protocol Built by the same company Question 3: a What is LAN? Answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. A network that connects workstations, terminals, and other devices a large metro politan area. A network that serves users across a geographically large area and often uses tr ansmission devices provided by a common carrier.

A network that covers a larger area than a MAN Question 4: b What do WAN do? Allows printer and file sharing Answer: Operate over a large geographic area Operates over a metropolitan area Provide host to host connectivity within a limmited area Question 5: c What type of numbering system is characterized by ones and zeros? Base 4 Base 10 Answer: Binary Hexadecimal Question 6: c Which numbering system is based on powers of 2? Octal Hexadecimal Answer: Binary ASCII Question 7: b What is the decimal number 151 in binary? 10100111 Answer: 10010111 10101011 10010011 Question 8: d What is the binary number 11011010 in decimal? 186 202 222 Answer: 218 Question 9: b Bandwidth is described in _________? Bytes per second Answer: Bits per second Megabits per milisecond Centimeters Question 10: c What term is usec to describe the rated throughput capacity of a given n etwork medium or protocol? TCP/IP Ethernet Answer: Bandwidth Routing protocol Chapter 2: Q1: a Which layer offers provisions for data expedition, class of service, and exception reporting? Answer: Session Presentation Network Datalink

Q2: b Which of the following is the PDU for the transport layer? Frame Answer: Segment Packet Bits Q3: c Which layer of the OSI model provides connectivity and path selection be tween two end systems where routing occurs? Physical Layer Data Link Layer Answer: Network Layer Transport Layer Q4: d Which layer of the OSI model is responsible for reliable network communi cation between end nodes and provides mechanisms for the establishment, maintena nce, and termination of virtual circuits, transport fault detection and recovery , and information flow control? Physical Layer Data Link Layer Network Layer Answer: Transport Layer Q5: b Which of the following best describes the function of the presentation l ayer? Responsible for the reliable network communication between end nodes. Answer: Concerned with data structures and negotiation data transfer syntax Provides connectivity and path selection between two end systems Manages data exchange between layer entities Q6: a What functions are the data link layer concerned with? Answer: Physical addressing, network topology, and media access. Manages data exchange between presentation layer entities Synchronizes cooperating applications, and establishes agreement on procedures f or error recovery and contronl of data integrity Provides mechanisms for the establishment, maintenance, and termination of virtu al circuits, transport fault detection, recovery, and information flow control. Q7: d Which of the following protocols uses UDP as its underlying protocol? SMTP FTP HTTP Answer: TFTP Q8: b Which of the following statements regarding TCP/IP is true? TCP/IP combines the OSI data link and session layer issues into its application layer Answer: TCP/IP combines the OSI data link and physical layers into one layer TCP/IP combines the OSI network and application layers into one network layer TCP/IP combines the bottom four layers of the OSI model into one Internet layer Q9: a Packets are encapsulation in frames at which layer of the OSI model?

Answer: Data link Network Transport Session Q10: b In the TCP/IP model which layer would deal with reliability, flow contro l, and error correction? Application Answer: Transport Internet Network Access Chapter 3: Q1: b A NIC is considered an OSI layer _____ device a. One Answer: Two c. Three d. Four Q2: a A hub is an OSI layer ____ device Answer: One b. Two c. Four d. Six Q3: c Which of the following is true concerning a bridge and its forwarding de cisions? They operate at OSI layer 2 and use IP addresses to make decisions. They operate at OSI layer 3 and use IP addresses to make decisions. Answer: They operate at OSI layer 2 and use MAC addresses to make decisions. They operate at OSI layer 3 and use MAC addresses to make decisions. Q4: b Which of the following is true concerning the function of a switch? Increases the sizes of collision domains Answer: Combines the connectivity of a hub with the traffic regulation of a brid ge Combines the connectivity of a hub with the traffic directing of a router Performs Layer 4 path selection Q5: c What do routers connect? Bridges and repeaters Bridges and hubs Answer: Two or more networks Hubs and nodes Q6: c Layer 1 Layer 2 Answer: Layer 4 Q7: a What is the correct order of encapsulation? What does a router route? bits frames Layer 3 packets segments

Answer: Data, segment, Packet, Frame, Bits Data, Frame, Packet, Segment, Bits Data, Packet, Frame, Segment, Bits Data, Bits, Packet, Frame, Segments Q8: c Which LAN topology connects all workstations to a central point, usually a hub or a switch? Bus Ring Answer: Star Hierarchical Q9: d When connecting four host computers in a LAN what is the minimum hardwar e needed to be used for file sharing capability? Cloud Switch Router Answer: Hub Q 10: c If 4 hosts are connected to a hub and then to the Internet, how many IP addresses are required for these 5 devices? One Two Answer: Four Five Chapter 4: Q1: b What kind of power is supplied to the microchips on the motherboard of a computer? AC Answer: DC RC MC Q2: a Where is the safely ground connected for a computer? Answer: Exposed metal parts The monitor The mouse The network connection Q3: d Electrons flow in ___ loops called ____ Open, voltage Closed, voltage Open, circuits Answer: Closed, circuits Q4: a A half duplex circuit means Answer: Only one side can talk at a time b. The signal strength is cut in half c. The signal strength is doubled d. Two hosts can set half their data Q5: c

Attenuation means Travel Delay Answer: A signal losing strength to its surroundings All of the above Q6: a Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? Answer: EMI caused by electrical motors RFI caused by electrical motors Impedance caused by radio systems EMI caused by lighting Q7: d What is the primary cause of crosstalk? Cable wires that are too large in diameter Too much noise in a cable s data signal Electrical motors and lighting Answer: Electrical signals from other wires in a cable Q8: b Which of the following describes cancellation? Wires in the same circuit cancel each other s electrical current flow Answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference The magnetic fields from one cable run cancel magnetic fields of another cable r un External magnetic fields cancel the fields inside network cabling Q9: c What is it called when two bits from two different communicating compute rs are on a shared medium at the same time? Latency Dispersion Answer: Collision Obstruction Q10: a ____ means converting binary data into a form that can travel on a physi cal communications link Answer: Encoding Decoding Encrypting Decrypting Chapter 5: Q11: a The network area within which data packets originate and collide is call ed a _____? Answer: Collision domain Network domain Collision segment Network segment shield Q2: b What happens to packets that are involved in a collision? The packets return to the originator Answer: The Packets are destroyed bit by bit The Packets continue on to the target device with corrupt data

Another Q3: c What is another name for a rollover cable? A patch cable A cross-connect cable Answer: A console cable An inverted cable Q4: c Using repeaters ____ the collision domain Reduces Has no effect on Answer: Extends Another Q5: c Make it Make it Answer: Allow 6 Q6: b Which best describes a collision in a Ethernet network? The effects of having too many repeaters in a network Answer: The result of two nodes transmitting at the same time The effect when two nodes have the same MAC address. The result of having non OSI compliant protocols on the network Q7: a How many collision domains exist in a network containing two hubs? Answer: One Two Three Five Q8: c Seperating collision domains with bridges, switches and routers is calle d ____ Switching domains Extending domains Answer: Segmentation Fragmentation Q 9: b Which best describes bus topology? All of its nodes connected directly to a central point (like a hub) Answer: All of its nodes connected directly to one physical link All nodes connected to each other (fully meshed) All nodes connected to exactly 2 other nodes Q 10: a Which of the following best describes an extended star topology? Answer: LAN topology where a central hub is connected by a vertical cabling to o ther hubs LAN topology in which transmissions from network stations propagate the length o f a single coaxial cable and are received by all other stations LAN topology in which end points on a network are connected to a common central switch by point-to-point links What does the twisting of the wires do in a CAT-5 cable? thinner less expensive Reduce noise problems pairs to fit in the space of 4 pairs

LAN topology where central points on a network are connected to a common central switch by linear links Chapter 6: Q1: a Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? Answer: IEEE 802.3 IEEE 802.5. EIA?TIA 568B EIA/TIA 569 Q2: a Which is not one of the recognized IEEE sublayers? Answer: Data link Control Media access control Logical link control Another Q 3: a Why did the IEEE create LLC? Answer: To meet the need to have part of the datalink layer function be independ ent of existing technologies To replace an older IBM protocol To create a protocol that would not be control by the US government To allow for data encryption before transmission Q4: b Convert the decimal number 2989 to Hex FDD1 Answer: BAD TED CAD Q5: a Convert the hex number ABE into decimal Answer: 2750 5027 2570 7250 Q6: b Convert the binary number 11100010 to hex D2 Answer: E2 G2 H20 Q7: a Which of the following statements best describes communication between t wo devices on a LAN? Answer: The source device encapsulates data in a frame with the MAC address of th e destination device, transmits, everyone on the LAN sees it, but the devices wi th non-matching addresses otherwise ignore the frame The source encapsulates the data and places a destination MAC address in the fram e. It puts the frame on the LAN, where only the device with matching address can check the address field The source device encapsulates data in a frame with the MAC address of the Desti nation device, puts in on the LAN, and the device with the matching address remo ves the frame

Each device on the LAN receives the frame and passes it up to the computer, where software will decide whether to keep or discard the frame Q8: b Layer 1 Answer: Layer 3 Layer 4 Q9: c How does a computer on a LAN detect an error in a frame? Send a copy of the frame back to the sender for verification Check the destination address to verify that the frame was really intended for t hem Answer: Compare a FCS in the frame to one that the computer calculates from the contents of the frame Calculate a checksum from the data in the frame, and send it back to the source for verification Q 10: c Which is true of a deterministic MAC protocol? It defines collisions and specifies what to do about them It allows the hub to determine the number of users active at any one time Answer: It allows hosts to take their turn for sending data It allows the use of a talking stick by network administrators to control the medi a access of any users considered troublemakers Chapter 7: Q1: a Which of the following describe Token-Ring? Answer: Data transfer rates of 4 Mbps or 16 Mbps Typically found with a linear bus topology Can only be implemented with fiber Uses collision detection for access method Q 2: c The data/command frame and token frame have which of the following field s in common? Start delimiter, frame check sequence (FCS), and access control Start delimiter, token control, and end delimiter Answer: Start delimiter, access control, and end delimiter Another Q3: d What is the difference between single-mode and multi-mode FDDI? Single-mode allows one mode of light to propagate through the fiber (1) Single-mode is capable of higher bandwidth than multi-mode (2) Single-mode can run longer distance than multi-mode (3) Answer: All (1), (2), (3) Q4: d It uses It is a It is a Answer: Q5: a If you hava to connect a FDDI between buildings, which mode of fiber woul One of the primary reasons FDDI is extremely reliable is because ____? CAT 3 cabling CSMA/CD network CSMA/CA network Of it s dual ring design A frame is a ______ PDU Layer 2 PDU PDU PDU

d you use? Answer: Single-mode Multi-mode Intra-mode Inter-mode Q6: a Which of the following is an accurate description of an Ethernet variety ? Answer: 10BASE T uses and transmits at 10 Mbps 10BASE - TX uses CAT5 and transmits at 100 Mbps 10BASE T uses CAT2 and transmits at 10 Mbps 100BASE FX is multi-mode fiber that transits at 10Mbps Q7: c The Ethernet version 2 header is ____ the header of an 802.3 frame Much longer than Much shorter than Answer: The same length as Completely different than Q8: c Which of the following is true regarding 10BASET signals? They use no type encoding They do not use any type of clocking signal when transmitting Answer: Designed to send and receive signals over a segment that consists of 4 w ires Designed to send and receive signals over a segment that consists of 6 wires Q9: b A _____ diminishes the traffic experienced by devices on all connected segments, because only a certain percentage of traffic is forwarded Hub Answer: Bridge Repeater NIC Q10: b Which of the following best describes a broadcast storm? A frame that will be sent to all nodes on a network Answer: When too many broadcasts are sent out over the network A section of a network that is bounded by bridges, routers, or switches The network areas within which frames that have collided are propagated Chapter 8: Q1: c If Acme Inc. occupies the first three floors of a building and each floo r is 1500 square meters, how many wiring closets should be installed according t o EIA/TIA 569? One Three Answer: Six Nine Q2: c Which of the following is a specification for walls, floors, and ceiling s of a wiring closet? A maximum of 3.65m feet of wall space should be provided for terminations and re lated equipment for the POP Rooms selected for wiring closets should have a dropped or false ceiling for eas

y access Answer: Interior walls on which equipment is to be mounted should be covered wit h 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 c m Fire retardant paint should never be used to cover interior walls due to health and safety restrictions Q3: b Which of the following is a requirement for room and equipment access in a wiring closet? The door should be at least 1.2 m wide and should swing open into the room ro en sure easy access to the room for workers and equipment Answer: The wiring closet should lock from an outside access in such a way that exiting from the room is always possible. Wiring hubs and patch panels must be wall-mountd using hinged wall brackets that are attached directly to the underlying wall surface When a distribution rack is usesd to mount patch panels and wiring hubs, the min imum distance for the rack from the wall should be 15 cm Q4: Question 1: What is the purpose of the safety ground in a computer? A. connects the hot wire to the chassis B. prevents metal parts from discharging hazardous voltage through the chassis C. connects the neutral wire to the chassis Answer: prevents metal parts from becoming energized with a hazardous voltage Question 2: What best describes a wiring closet specification? A. No horizontal cabling coming from work areas should be run under a raised floor. B. All cable leaving the room to intermediate distribution facilities and computer and communications rooms located on other floors of a building should be via 8 cm (or smaller) conduits or sleeved cores. ?C. Any wall or ceiling openings provided for conduits or sleeved cores must be sealed with smoke and flame retardant materials. Answer: The room should be equipped with a single stage sprinkler system. Question 3: When starting to design a network, what should be the first step in the process? Answer: collecting information about the organization B. gathering information about the network devices and media that will be used C. documenting costs and developing a budget for implementation D. identifying the resources and constraints of the

organization Question 4: What happens if you touch two objects with different potential voltages? A. nothing Answer: you complete the circuit and get a shock C. the computer receives a power surge D. the computer may lose data Question 5: What kind of floor should the wiring room have? Answer: tile or other finished surface B. carpet C. unfinished stone D. electronics grade carpet Question 6: How can the creation of potentially dangerous circuits between buildings be avoided? A. A voltage regulator, that will shut off the network if the voltage gets too high, should be installed at both buildings. Answer: Fiber-optic cable should be used as the backbone of the network. C. Shielded twisted pair (STP) cable should be used as the backbone of the network. D. New ground wires should be installed so that the energy potentials between the buildings will be the same. Question 7: What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? A. Nothing, because IEEE standards separate LAN networking media from power connections. B. The networking media could allow the network to run at higher speeds. C. The networking media would ground the signal preventing it from operating normally. Answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. Question 8: Why should fluorescent light fixtures be avoided in wiring closets? A. They provide false color lighting which can lead to mistakes in making connections. Answer:. They generate outside interference. C. They can degrade some plastic materials used in network equipment. D. There often is insufficient room in a wiring closet to

change out the fluorescent bulbs easily and safely. Question 9: In what types of situations will a safety ground connection not be sufficient? Answer:. building B. when identical C. when that defeats the earth D. when different potential when the earth ground is attached to multiple floors of a the earth grounds between two parts of a network are the power plant sends an irregular surge of power ground ground wires in separate locations have slightly

Question 10: How can UTP backbone cabling facilitate entry of lightning into a building? A. The insulation in the wire acts as a lightning rod and attracts the strike. Answer:. The copper provides a pathway for lightning to enter a building. C. It won't facilitate lightning strikes if the wire is fused at both ends. D. It does not facilitate lightning strikes unless the copper has been damaged. Question 11: What best describes the problems caused by electrostatic discharge (ESD)? A. It erases power supplies, hard drives, and RAM. Answer:. It destroys semiconductors and data. C. It shoots alternating current through a computer. D. It overwrites the BIOS chip. Question 12: If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA/TIA 569? A. one B. three Answer:. six D. nine Question 13: What is the first step in locating a wiring closet for a network? A. Identify the number of computers that will be part of the network. B. Identify the number of printers and file servers that will be part of the network. Answer:. Identify on a floor plan, all devices that will be

connected to the network. D. Identify the topological requirements of devices that will be in the network. Question 14: What kind of power disturbances can be caused by strikes? A. oscillations B. sags Answer:. surges D. brownouts Question 15: What network device is used in an extended star topology when the catchment area of one wiring closet is not enough? Answer:. repeater B. backoff C. terminator D. suppressor Question 16: What is a common cause of oscillation often called harmonics? Answer:. excessively long electrical wiring runs B. nearby lightning strikes C. a power line that falls below 80% of the normal voltage D. power company switching operations Question 17: Why are common mode problems a hazard to you or your computer? Answer:. They go directly to the computer chassis. B. They go directly to the computer's CPU. C. They short wires to the power supply. D. They fuse computer components. Question 18: Where should the main distribution facility (MDF) be located in a multi-story building using an extended star topology? A. next to the POP B. on the first floor Answer:. on one of the middle floors D. in the basement Question 19: What best describes the difference between alternating and direct current? A.DC helps computers to work more efficiently, whereas AC can cause noise. B. AC flows at a constant value, whereas DC rises and falls. C.DC shifts ions from pole to pole, whereas AC ions run in one direction. Answer:. DC flows at a constant value, whereas AC rises and falls. Question 20: How does AC line noise create problems? A. by overflowing the logic gates Answer:. by adding unwanted voltage to the desired signals C. by hindering the CPU in detecting signal waves

D.

by intensifying the leading and trailing edges on signals

Question 21: What is the "one-hand rule?" Answer:. Only touch electrical devices with one hand at a time to prevent electricity from flowing through the body. B. When setting up the network only use one bare hand--always wear a glove on at least one hand. C. When using tools that are not insulated only use one hand, hold onto a ground with the other hand. D. There is no such rule. Question 22: Which type of networking media is now installed most often for backbone cabling? A. 100 ohm unshielded twisted pair cable B. 150 ohm shielded twisted pair cable Answer:. 62.5/125 micron fiber-optic cable D. 50 ohm coaxial cable Chapter 9 Question 1: Which of the following is a source that can produce interference on UTP cable? Answer:. fluorescent lights B. fiber-optic cabling C. bridges D. coaxial cabling Question 2: Why are split pairs a problem for network installations? A. The wires are unshielded and easily lose synchronicity. Answer:. The wires are part of different circuits so signals are not protected and cross-talk occurs. C. The wires are part of different circuits and easily shorted out by power spikes. D. It is difficult to detect split pairs which requires performing a wire map. Question 3: When should cable not be routed in an existing raceway? A. if the raceway distance exceeds 100 feet B. if the raceway material is partially metallic Answer:. if it already contains a power cable D. if it contains a telephone line Question 4: What is the central junction for the network cable? A. POP B. server C. center point Answer:. wiring closet Question 5: What should be used to mount cable to a wall?

Answer:. tie wraps B. electrical tape C. staples D. paperclips Question 6: If you have one wiring closet and you want to add more, what name is given to additional wiring closets? Answer:. IDFs B. MDFs C. Extended Stars D. POPs Question 7: All the items below are personal safety precautions before you install cable except : A. Wear long sleeves. B. Wear long pants. Answer:. Wear baggy clothes. D. Check for power cables. Question 8: What tool would you use to attach CAT5 cable to a patch panel? A. 110 patch tool B. cable terminator Answer:. punch tool D. patch terminator Question 9: What is one advantage of using distribution racks for mounting patch panels? Answer:. allows easy access to both the front and back of the equipmen t B. C. D. provides neutral ground inexpensive compared to brackets requires minimal wall space

Question 10: Why is the wiring sequence critical when RJ-45 jacks are used at the telecommunications outlet in a horizontal cabling scheme? Answer:. For the network to function properly. B. Improper wiring sequence will short out the connection. C. You could get a nasty electrical shock. D. The collision rate is adversely affected. Question 11: What is the most important thing to do before you work in walls, ceilings or attics? A. Label the faceplate. B. Measure out the cable. Answer:. Turn off power to the area. D. Install the patch panel. Question 12: What kind of jack must be used for making a connection to a Category 5 unshielded twisted pair cable in a horizontal cabling scheme? Answer:. RJ-45 B. BNC C. UTP 55

D.

EIA 45

Question 13: Why shouldn't you install a jack in the bottom five centimeters of a wooden baseboard? Answer:. The bottom plate of the wall will prevent you from pushing th e box into the baseboard. B. Most floors have metal supports that produce electromagnetic interference when close to the jack. C. Dust and dirt accumulate under it that can then get into the connection and affect network performance. D. It's so close to the floor, there isn't enough space for most people to work and manipulate the wires. Question 14: Which of the following describes a cable tester measurement of signal attenuation? Answer:. It measures the reduction in power of a signal received from a signal injector. B. It measures the increase in power of a signal received from a signal injector. C. The signal injector attaches to the near end of the cable. D. The frequency to be used for testing is specified in EIA/TIA 568A. Question 15: How is an RJ-45 jack surface mounted? A. with a punch tool B. with Velcro C. flush with the surface Answer:. adhesive backed or screw box Question 16: What is the first thing you should do if near-end crosstalk is detected? A. Redo all connections at the patch panel. B. Isolate which connection is the cause by running a TDR test. C. Redo all connections at the cross connects. Answer:. Visually check the horizontal cabling. Question 17: Which best describes a patch panel's function? A. It serves as a temporary fix to network problems. B. It acts as a router for temporary networks connecting the various devices often found at conventions and shows. Answer:. It acts as a switchboard where horizontal cabling from workst ations can be connected to other devices to form a LAN. D. It allows the network administrator to test the entire network cabling from a single location. Question 18: How many pins are on each of the ports of a patch panel? A. 4 pins Answer:. 8 pins C. 11 pins D. 45 pins Question 19: What should be done when preparing to run cable?

A. Cut the cable before pulling it. B. Unroll it before pulling it through the ceiling. Answer:. Label the boxes and cable. D. Take the cable out of the boxes. Question 20: What kind of a cable must you use when laying cable through spaces where air is circulated? A. shielded B. double coated Answer:. fire rated D. unshielded Question 21: How does a cable tester (a TDR) measure distance? A. The cable tester identifies signal degradation, indicating the cable is longer than the acceptable maximum length. B. It determines the time a signal takes to be reflected back from closed-ended cable. Answer:. It times the signal sent towards and reflected back from the end of an open-ended cable. D. It measures the ability of other devices on the network to receive and send signals through the cable. Question 22: What type of raceway should be used if it will be visible in the room? A. channel guide Answer:. decorative C. ladder rack D. gutter Question 23: Why is establishing a baseline performance level for a network important? A. for fulfilling one of the requirements necessary for you to get your network certification B. for providing your client with proof of a successful installation Answer:. for future periodic testing of the network and diagnostics D. for obtaining a network registration and identification number from TIA/EIA and IEEE Question 24: What is a rough diagram that shows where the cable runs are located called? Answer:. cut sheet B. sketch C. cable plan D. cabling route Question 25: When running cable from the wiring closet to wall jacks, where is the cable itself labeled? A. at each tie Answer:. at each end C. at the jack end D. at the panel end Chapter 10

Question 1: What characteristic must hosts on a network possess in order to communicate directly ? A. same vendor code Answer:. same network ID C. same MAC address D. separate subnets Question 2: Which of the following describes the effect of subnetting on the amount of broadcast traffic? Answer:. decreases it, because broadcasts are not forwarded outside a subnet B. decreases it, because it will take less time for a host to get broadcasts from the routers. C. increases it, because the packets must be forwarded to all subnets D. increases it, because router's duplicate broadcasts Question 3: Which of the following correctly describes an ISP? A. Internal Service Protection B. Internal Service Provider Answer:. Internet Service Provider D. Internet Service Protection Question 4: Which of the following is an example of a Class C broadcast address? A. 190.12.253.255 B. 190.44.255.255 Answer:. 221.218.253.255 D. 129.219.145.255 Question 5: What is decimal number 164 in binary? Answer:. 10100100 B. 10010010 C. 11000100 D. 10101010 Question 6: Which of the following is the approximate number of hosts supported in a Class B unsubnetted network? A. 254 B. 2024 Answer:. 65 thousand D. 16 million Question 7: Which of the following describes the relationship between path determination and the routing of packets? A. performed only by switches B. performed only by different devices C. they are different processes Answer:. they are the same process Question 8: Which OSI layer adds an IP header? A. Layer 1

B. Layer 2 Answer:. Layer 3 D. Layer 4 Question 9: Which type of addressing scheme is formed by MAC addresses? Answer:. flat B. circular C. hierarchical D. elliptical Question 10: Which address(es) appear in an IP packet's header? A. source address B. destination address Answer:. source and destination addresses D. there are no addresses in the IP packet header. Question 11: Which of the following is a benefit of network segmentation? Answer:. reduced congestion B. reduced equipment requirements C. creation of more IP addresses D. creation of more MAC addresses Question 12: Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer:. 205.255.170.205 B. 109.255.170.109 C. 205.127.200.205 D. 109.127.200.109 Question 13: Which octet(s) are assigned locally in a class B address? A. The first octet is assigned locally. B. The second octet is assigned locally. C. The first and second octets are assigned locally. Answer:. The third and fourth octets are assigned locally. Question 14: What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? A. 2 B. 4 Answer:. 6 D. 8 Question 15: What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? A. partitions B. autonomous systems Answer:. subnets D. divisions Question 16: Which class of network addresses allows the borrowing of 15 bits to create

subnets? Answer:. Class A B. Class B C. Class C D. No class of network allows the borrowing of 15 bits. Question 17: Which part of a network layer address does the router use during path determination? A. the host address B. the router address C. the server address Answer:. the network address Question 18: Which of the following represents the use of binary ones in a subnet mask? A. host bits B. subnet bits C. network bits Answer:. subnet and network bits Question 19: How large is the network/subnet portion of a Class B license having a subnet mask of 255.255.240.0? A. 18 bits B. 19 bits Answer:. 20 bits D. That is an invalid mask for a Class B network. Question 20: How many bits are in an IP address? A. 4 B. 8 C. 16 Answer:. 32 Question 21: How many total subnets can be created if four bits are borrowed from the host field? A. 8 Answer:. 16 C. 32 D. 64 Question 22: What is specified by the network number in an IP address? Answer:. the network to which the host belongs B. the physical identity of the computer on the network C. the node of the subnetwork which is being addressed D. the broadcast identity of subnetwork Question 23: Which of the following assists devices on the same network in determining a packet's final destination? A. source IP address B. vendor number C. host protocol Answer:. host ID Question 24:

Which of the following would be the largest possible number expressed by an 8 bit binary number? A. 0 Answer:. 11111111 C. 10101011 D. 10101010 Question 25: Which of the following best describes the address 139.219.255.255 in an unsubnetted environment? A. Class A broadcast address B. Class B host address Answer:. Class B broadcast address Class C host address Chapter 11 Question 1: The IP address for a router interface should be part of what? Answer:. the network attached to the interface B. any network attached to the router C. it does not matter D. router interfaces never have IP addresses Question 2: When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? A. IP address of the router B. MAC address of the router C. MAC address of the destination device Answer:. IP address of the destination host Question 3: What is the correct term for when routes are learned automatically? A. static routing B. automatic routing C. enhanced routing Answer:. dynamic routing Question 4: What do bridges and switches use to make data forwarding decisions? A. logical addresses Answer:. physical addresses C. network addresses D. IP addresses Question 5: Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer:. router B. hub C. bridge D. switch Question 6: Which type of routing protocol is RIP? Answer:. distance vector B. link state C. hybrid

D.

spanning tree

Question 7: Router ARP tables hold information from which of the following? A. all Ethernet LANs Answer:. all networks connected to them C. all networks in the Internet D. MAC addresses only Question 8: What is the most common protocol used to transfer routing information between routers located on the same network? A. OSPF Answer:. RIP C. IGRP D. EIGRP Question 9: In a connection-oriented system, what happens before any user data is transferred? A. a connection is established with the recipient's local router Answer:. a connection is established between the sender and receiver C. a connection is established with the sender's local router D. the destination is not contacted before any actual data is sent Question 10: What happens if a data packet reaches a router that is destined for a network with which that router is not directly connected? A. The router forwards the packet to all other routers. B. The router returns the packet to the source device with no explanation. Answer:. The router forwards the packet to another router that most li kely contains information about the destination. D. The router returns the packet to the source device with the explanation that the destination was unreachable. Question 11: Which of the following contains a unique network number that is used in routing? A. MAC address B. physical address Answer:. IP address D. NIC card Question 12: Which protocol is used to dynamically assign IP addresses? Answer:. DHCP B. ARP C. proxy ARP D. IGRP Question 13: Connection-oriented network processes are often referred to as what? A. packet switched B. segment switched Answer:. circuit switched D. network switched Question 14:

Which describes the changes made to a packet's IP destination address, as that packet is passed from router to router on it's way to the destination host? A. The destination IP address changes each hop, to be the address of the next router. B. The destination IP address changes anytime a router is sending the packet over a WAN. C. The destination IP address will always be the address of the first router. Answer:. The destination IP address never changes. Question 15: Which protocol can find the MAC address of a computer given its IP address? A. RARP B. DHCP Answer:. ARP D. Proxy RARP Question 16: Why is a static route the preferred method for reaching stub networks? Answer:. static routing requires less overhead B. static routing requires more overhead on the network C. this allows routers to adjust to changes in the network D. the routes are learned automatically Question 17: What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer:. proxy ARP B. proxy RARP C. RARP D. subnetting Question 18: Which is an example of a routed protocol? A. RIP Answer:. IPX/SPX C. EIGRP D. OSPF Question 19: IP relies upon which OSI layer protocol to determine whether packets have been lost and request retransmission? A. application B. presentation C. session Answer:. transport Question 20: What do routers use to exchange routing tables and share route information? A. routed protocols B. transport protocols Answer:. routing protocols D. UDP protocols Question 21: Which type of routing allows routers to adjust to changing network

conditions? A. static Answer:. dynamic C. automatic D. stub Question 22: Which of the following is an example of an IGP (Interior Gateway Protocol)? A. IPX B. SPX C. UDP Answer:. IGRP Question 23: In a connectionless system, which of the following is correct? Answer:. The destination is not contacted before a packet is sent. B. The destination is contacted before a packet is sent. C. A connectionless connection is established with the recipient before a packet is sent. D. A non-connection is established between the sender and recipient before a packet is sent. Question 24: Which is a network layer protocol that can be routed? Answer:. IP B. ISP C. NetBEUI D. ARP Question 25: What are the two proprietary routing protocols developed by Cisco? A. RIP and OSPF Answer:. IGRP and EIGRP C. IPX and SPX D. TCP and IP Question 26: When configuring a host computer, which of the following describes the router interface that connects to the same network segment? A. default interface Answer:. default gateway C. default port D. default subnet Chapter 12+13+14 (have no ) Question 1: Which of the following is a main function of the presentation layer? A. dialogue control B. managing applications C. windowing D. data compression Question 2: Which simple protocol exchanges datagrams, without acknowledgements or guarantee d delivery? A. TCP B. ASP C. TCP/IP

D.

UDP

Question 3: What is the correct term for the orderly initiation, termination, and managing o f communication? A. dialogue separation B. dialogue control C. segmentation D. expectational acknowledgement Question 4: Which layer of the OSI model is responsible for the compression of files? A. transport B. session C. presentation D. application Question 5: What type of tion? A. two-way B. two-way C. two-way D. one-way communication is used when two messages can cross during a conversa simultaneous continuous alternate alternate

Question 6: What is the term used when sound files are downloaded while they are playing? A. Musical Instrument Digital Interface B. EBCDIC C. video streaming D. streaming audio Question 7: Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? A. window size B. closed connection C. two way handshake D. expectational acknowledgement Question 8: What is it called when the session layer decides whether to use two-way simultan eous or two-way alternate communication? A. expectational acknowledgement B. dialogue separation C. resynchronization D. dialogue control Question 9: If one system uses EBCDIC and a second system uses ASCII, which layer provides t he translation between the two different types of code? A. Layer 6 B. Layer 5 C. Layer 4 D. Layer 3 Question 10: What file format acts as a set of directions that tell a web browser how to disp lay and manage documents? A. HTML

B. C. D.

HTTP MIDI JPEG

Question 11: Since TCP reassembles segments into complete messages, what happens if a sequenc e number is missing in the series? A. The segment is dropped. B. The missing segment is re-transmitted. C. All segments are retransmitted from the beginning. D. Sequence numbers are never checked when using TCP. Question 12: Which ports are reserved by TCP and UDP for public applications? A. numbers from 255 to 1023 B. numbers below 255 C. numbers above 1023 D. numbers from 0 to 1023 Question 13: Which layer is responsible for data encryption? A. Layer 7 B. Layer 6 C. Layer 5 D. Layer 4 Question 14: Which of the following would describe Transmission Control Protocol? A. unreliable B. connection-oriented C. connectionless D. Layer 3 Question 15: What is the correct term for the sequence that synchronizes a connection at both ends before any user data is exchanged? A. closed connection B. segment retransmission C. three-way handshake D. sliding windows Question 16: The session layer establishes, manages, and terminates sessions between ________ _____. A. networks B. servers C. applications D. media Question 17: What type of A. two-way B. two-way C. two-way D. one-way communication avoids interrupts by taking turns? simultaneous symmetric alternate continuous

Question 18: Which of the following is a characteristic of TCP? A. unreliable

B. C. D.

connectionless divides outgoing messages into segments provides no software checking for segments

Question 19: Which layer of the OSI model has the primary duty of regulating the flow of info rmation from source to destination reliably and accurately? A. presentation B. session C. transport D. network Question 20: Which of the following would be an example of an important Layer 5 protocol? A. OSPF B. NFS C. IGRP D. FTP Question 21: What is ASCII and EBCDIC used to format? A. graphics B. text C. digitized music D. video Question 22: What are two file formats used by the Internet applications to display still ima ges? A. WAV and HTML B. PICT and MIDI C. GIF and JPEG D. MPEG and TIFF Question 23: Which layer of the OSI model is responsible for presenting data in a form that t he receiving device can understand? A. transport B. session C. presentation D. application Question 24: At which OSI layer does TCP operate? A. Layer 4 B. Layer 5 C. Layer 6 D. Layer 7 Question 25: In a TCP segment, which field defines the number of octets a recipient is willin g to accept? A. flag B. checksum C. window D. HLEN Chapter 15 Question 1:

In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer:nswer:. the domain B. the protocol to be used C. the type of resource to contact D. the folder Question 2: The Telnet application works mainly at which layers of the OSI model? A. application and presentation Answer:nswer:. application, presentation, and session C. presentation and session D. presentation, session, and transport Question 3: Which application layer protocol supports e-mail programs? A. SNMP Answer:nswer:. POP3 C. TFTP D. Telnet Question 4: What is the language used to create web pages? A. HTTP Answer:nswer:. HTML C. GIF D. ASCII Question 5: What is an example of an application that requires both a client and server comp onent in order to function? Answer:nswer:. web browser B. Microsoft Word C. ASCII D. PICT Question 6: If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer:nswer:. redirector B. file locator C. StorFil D. SNMP Question 7: Which of the following allows for routing that is based on classes of address, r ather than individual addresses? A. DNS address B. MAC address C. WINs address Answer:nswer:. IP address Question 8: Which protocol is designed to download or upload files on the Internet? A. SNMP B. Telnet Answer:nswer:. FTP D. HTTP Question 9: Which layer of the OSI model is closest to the user and determines whether suffi

cient resources exist for communication between systems? A. transport B. session C. presentation Answer:nswer:. application Question 10: Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? A. extender B. TCP Answer:nswer:. redirector D. Uniform Resource Locator Question 11: Which connection is made to a server and maintained until the user terminates th e connection? A. printing a file from a web page B. an FTP connection Answer:nswer:. downloading a web page D. processing a web transaction Question 12: What type of server is used to translate a domain name into the associated IP ad dress? A. FTP Answer:nswer:. DNS C. TFTP D. DHCP Question 13: E-mail addresses consist of which two parts? Answer:nswer:. recipient's username and postoffice address B. InterNIC name and postoffice address C. server ID and router ID D. Electronic portfolio and IP address Question 14: Which OSI layer does not provide support for any other OSI layer? Answer:nswer:. application B. session C. network D. physical Question 15: Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? A. network redirector Answer:nswer:. hyperlink C. web browser D. ASCII Exam Exam1 Question 1: What is the data-link destination address of a broadcast message? A. 111.111.111.111 B. 255.255.255.255 C. AAAA.AAAA.AAAA

Answer:nswer:.

FFFF.FFFF.FFFF

Question 2: What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? A. The name server looks at the request and replies with the MAC address of ho st B. B. All devices look at the request and any device will reply with the IP addre ss of host B. Answer:nswer:. All devices look at the request and ONLY host B will reply with the MAC address. D. The nearest router looks at the request and replies with the MAC address of host B or forwards the request to another router. Question 3: Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? A. Application B. Presentation Answer:nswer:. Session D. Transport Question 4: Which best describes the structure of a MAC address? A. 16 bit network code plus 16 bit serial number B. 16 bit vendor code plus 16 bit serial number Answer:nswer:. 24 bit vendor code plus 24 bit serial number D. 24 bit network identity plus 24 bit host identity Question 5: Which best describes the function of the Physical Layer? A. Provides network services to user applications. B. Establishes, maintains, and manages sessions between applications. C. Uses a MAC address to provide transmission across media and handles error n otification, network topology, and flow control. Answer: Provides electrical, mechanical, procedural and functional means for a ctivating and maintaining links between systems. Question 6: What best describes the functions of the Application Layer? A. Establishes, manages, and terminates applications B. Supports communicating components of applications such as e-mail Answer:nswer:. Defines end-to-end delivery of packets D. Translates between different data formats such as ASCII and EBCDIC Question 7: What happens after a collision has occurred on a network after the jam signal is sent? A. The router clears the route and notifies the source to resend Answer:nswer:. All stations stop sending frames for a randomly selected time p eriod C. A keepalive signal is generated to hold the message until the route clears D. The source station waits for the collision to dissipate and then broadcasts an all clear Question 8: Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? A. Hub B. Bridge

Answer:nswer:. D. Router

Ethernet switch

Question 9: Why has a layered network model been developed? A. Stabilizes development times and reduces number of proprietary hardware sch emes. B. Takes a holistic approach to networking and encourages comprehensive engine ering solutions. Answer:nswer:. Accelerates evolution, ensures interoperable technology and fac ilitates modular engineering. D. Increases complexity and flexibility to deal with multiple sources of hardw are. Question 10: Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? Answer:nswer:. Windowing B. Broadcasting C. Error recovery D. Collision avoidance Question 11: If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? A. 2 B. 6 Answer:nswer:. 14 D. 30 Question 12: During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? A. Recovery and flow control B. Encapsulation and broadcasting Answer:nswer:. Acknowledgement and retransmission D. Synchronization and acknowledgement Question 13: Which Layer of the OSI model is concerned with the topology of a network? A. Transport B. Network Answer:nswer:. Data Link D. Physical Question 14: Which network device provides internetworking and broadcast control? A. Hub B. Bridge C. Ethernet switch Answer:nswer:. Router Question 15: Where is the Layer 2 address found on a workstation? A. In the routing table Answer:nswer:. On the network interface card C. In the name server table D. It is located on the DHCP server

Question 16: What are the most common LAN technologies used in networking today? A. Ethernet, token ring, DecNET Answer:nswer:. Ethernet, token ring, FDDI C. Ethernet, DecNET, FDDI D. Ethernet, token ring, ARCnet Question 17: Which of the following is true about a CSMA/CD network? A. Signals are always sent in multi-frame broadcast mode. B. One node's transmission goes to the nearest router that sends it directly t o the destination. C. Signals are sent directly to the destination if both the MAC and IP address es are known by the source. Answer: One node's transmission traverses the entire network and is seen and che cked by every node. Question 18: Which Layer of the OSI model provides data representation and code formatting? A. Application Layer Answer:nswer:. Presentation Layer C. Session Layer D. Transport Layer Question 19: What correctly describes the five conversion steps of data encapsulation? Answer:nswer:. Data-segments-packets-frames-bits B. Data-packets-segments-frames-bits C. Data-frames-segments-packets-bits D. Data-segments-frames-packets-bits Question 20: Which OSI Layer determines best path selection? A. Transport Layer Answer:nswer:. Network Layer C. Data Link Layer D. Physical Layer Question 21: Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? Answer:nswer:. There will be no response. B. The router will respond with the MAC address of host Z. C. The router will respond with it's own MAC address. D. The router will forward the request to the correct subnet so host Z can res pond. Question 22: Which Layer of the OSI model handles data encryption? A. Application Answer:nswer:. Presentation C. Session D. Transport Exam2 Question 1: Routers make forwarding decisions based on which kind of address? Answer:nswer:. logical B. layer 2

C. D.

physical hardware

Question 2: Which Cisco IOS command is used to enter privileged mode? A. admin B. root Answer:nswer:. enable D. privileged Question 3: What is the default user-mode prompt for a Cisco router? A. # B. Router Answer:nswer:. Router> D. Router% Question 4: What do WAN Data link protocols describe? A. The electrical, mechanical, operational, and functional connections B. The process used for error detection Answer:nswer:. How frames are carried between systems D. How applications are started and stopped Question 5: What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? A. It indicates that you are in help mode B. It indicates that you are in privileged mode Answer:nswer:. It indicates the location of an error in a command string D. It indicates that more information must be entered to complete the command Question 6: What best describes Frame Relay? Answer:nswer:. Uses high quality digital facilities with no error correction B. Digital service that transmits voice and data over existing telephone lines C. Provides router-to-router and host-to-network connections over synchronous and asynchronous circuits D. Supports point-to-point and multipoint configurations over high speed analo g circuits Question 7: Which layers of the OSI model do WAN standards describe? A. Data link and network B. Network and transport C. Physical and application Answer:nswer:. Physical and data link Question 8: Which is an example of a data circuit terminating equipment (DCE)? Answer:nswer:. Modem B. Computer C. Router D. Multiplexer Question 9: What is the prompt of a Cisco router in the priviledged mode? A. Router> Answer:nswer:. Router

C. Router(config-if) D. Router(config-router) Question 10: Which packet-switched service is more efficent than X.25? Answer:nswer:. Frame Relay B. Digitial Subscriber Line C. Asynchronous Transfer Mode D. Switched Multimegabit Data Service Question 11: If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? A. Help Answer:nswer:. ? C. CTRL-H D. CTRL-P Question 12: What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? A. The end key B. The tab key Answer:nswer:. The spacebar D. The page down key Question 13: Which memory component of a router loses its content when the router is turned o ff? Answer:nswer:. RAM B. ROM C. FLASH D. NVRAM Question 14: What can only be done in privileged mode on Cisco routers? A. Enter Commands B. Check routing tables C. Monitor performance Answer: Change the configuration Question 15: Which character is used to enter the help mode? A. ! Answer:nswer:. ? C. * D. % Question 16: Which protocol does a WAN use to make path determination decisions? A. RIP B. IGRP Answer:nswer:. IP D. OSPF Question 17: Which WAN protocol supports point-to-point and multipoint configurations? Answer: HDLC B. CHAP C. PPP

D.

ISDN

Question 18: Which of the following WAN technologies is a Circuit-Switched Service? A. Asynchronous Transfer Mode Answer: Narrowband ISDN C. Frame Relay D. Switched Multimegabit Data Service Question 19: Which of the following WAN technologies is a Cell-Switched Service? A. Frame Relay B. ISDN Answer: Asynchronous Transfer Mode D. POTS Question 20: Which of the following are stored in NVRAM? A. Routing Tables Answer: Configuration Files C. IOS Image D. Power on diagnostics Question 21: What do the WAN Physical Layer standards describe? A. Interface between SDLC and HDLC Answer: Interface between DTE and DCE C. How frames are sent and verified D. How voice and data traffic are routed Question 22: Which keystroke will recall the previous command entry on a Cisco router user in terface? A. Left arrow B. Right arrow C. Down arrow Answer:. Up arrow Question 23: Which service does a WAN provide to LANs? A. Direct routing with error checking B. IP addressing and secure data transfer C. High speed multiple access to data networks Answer:. Exchange of data packets between routers and the LANs they support Question 24: In which Layer of the OSI Model do WAN routers operate? A. Transport Layer Answer: Network Layer C. Data Link Layer D. Physical Layer Question 25: When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? Answer: User mode B. Enable mode C. Privileged mode D. Global configuration mode

Exam3 Question 1: Which Cisco IOS command shows the configuration file stored in NVRAM? A. show version B. show running-config Answer: show startup-config D. show interfaces Question 2: Which external configuration source is used with a modem? A. TFTP Server Answer: AuxiliaryPort C. Console Terminal D. Virtual Terminal Question 3: The show interface serial Cisco IOS router command can display which one of the following lines of information? A. DecNET routing is enabled. B. System image file is c4500-j-mz. Answer: Serial1 is up, line protocol is up. D. IOS (tm) 4500 Software (C4500-J-M), Experimental Version. Question 4: Which router component stores configuration files even when power is off? A. RAM B. ROM C. Flash Answer: NVRAM Question 5: What is the router prompt for the interface configuration mode? A. Router(config) Answer: Router(config-if) C. Router(config-line) D. Router(config-router) Question 6: Which protocol is used to show summary configuration information about a directl y connected Cisco router? A. Network Control Protocol Answer: Cisco Discovery Protocol C. Address Resolution Protocol D. Transmission Control Protocol Question 7: Which Cisco IOS command is used to show current telnet connections? A. show telnet B. show history C. show version Answer: show sessions Question 8: What is the correct command to go from the user EXEC mode to the privileged EXEC mode? A. login Answer: enable C. interface type number D. configure terminal

Question 9: Which Cisco IOS command displays routing table entries? A. ping B. trace Answer: show ip route D. show interface Question 10: What is stored in working RAM and is constantly updated when the router is worki ng properly? A. IOS B. Command Executive Answer: Routing Table D. Active Configuration File Question 11: When is the configuration file loaded into RAM? Answer: Each time the router is initialized B. Each time the routing tables are updated C. Each time the command copy run start is issued D. Each time the router is place in the priviliged EXEC mode Question 12: Which command will indicate the status of IP, IPX, and AppleTalk? A. show version B. show interfaces C. show startup-config Answer: show protocols Question 13: What is the first thing the router does when power is turned on? A. Copies the IOS into RAM Answer: Executes a bootstrap program C. Configures the interfaces for IP routing D. Loads the Startup-Configurations file into RAM Question 14: Which port is used to initially configure a router? A. Auxiliary Answer: Console C. Serial D. BRI Question 15: Which response to the appropriate show command indicates an operational serial l ink? Answer: Serial1 is up, line protocol is up B. Serial1 is up, line protocol is down C. Serial1 is down, line protocol is down D. Serial1 is administratively down, line protocol is down Question 16: Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? A. SETUP Answer: RXBOOT C. Privileged EXEC D. Global configuration

Question 17: How many Telnet sessions can a Cisco router have simultaneously? A. 10 B. 7 Answer: 5 D. 1 Question 18: Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? A. show mem B. show flash C. show running-config Answer:nswer:. show startup-config Question 19: Which router component provides working memory for configuration files and routi ng tables? Answer:nswer:. RAM B. ROM C. Flash D. NVRAM Question 20: Which command shows the status of Ethernet, Serial, BRI, and other ports? A. show version Answer:nswer:. show interfaces C. show running-config D. show startup-config Question 21: Which router component is responsible for the power-on bootstrap sequence? A. RAM Answer:nswer:. ROM C. Flash D. NVRAM Question 22: Which command displays information about the current Cisco IOS software version running on a router? A. show stacks Answer:nswer:. show version C. show interface D. show startup-config Question 23: In which OSI Layer does the Cisco Discovery Protocol (CDP) operate? A. Layer 1 Answer:nswer:. Layer 2 C. Layer 3 D. Layer 4 Exam 4 Question 1: Which Cisco IOS command displays the backup configuration file stored in NVRAM? A. Router#show flash B. Router#show nvram C. Router#show running-config Answer:nswer:. Router#show startup-config

Question 2: While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? A. pound signs - example #yes# B. parentheses - example (yes) C. percent signs - example %yes% Answer:nswer:. square brackets - example [yes] Question 3: What is the first global configuration parameter set when using the setup mode? A. enable password B. routing protocol Answer:nswer:. host name of the router D. interface configuration Question 4: What is the function of the erase startup-config command? A. It deletes the current IOS from NVRAM B. It deletes the configuration file in RAM Answer:nswer:. It deletes the configuration file in NVRAM D. It deletes the bootstrap image from Flash memory Question 5: You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? A. copy config startup-config Answer:nswer:. copy running-config startup-config C. configure memory D. copy running-confignvram Question 6: Which command will save an active configuration? A. config t B. config memory C. copy startup-config running-config Answer:nswer:. copy running-config startup-config Question 7: How does the router prompt appear when you are in global configuration mode? A. Router B. Router-config Answer:nswer:. Router(config) D. Router(config-router) Question 8: Where is the next place a router looks if it cannot find the IOS image in flash? A. RAM B. ROM Answer:nswer:. TFTP D. NVRAM Question 9: What is the function of the reload command? Answer:nswer:. It reboots the router B. It saves the new IOS to Flash memory C. It loads a new configuration file in NVRAM D. It loads a configuration file from a TFTP server Question 10:

Which of the following is the correct order in which a router boots and looks fo r files? 1. Bootstrap from ROM 2. Config from NVRAM 3. Config from setup 4. Config from tftp 5. IOS from flash 6. IOS from ROM 7. IOS from tftp A. 5,7,6,1,2,4,3 B. 1,5,7,6,3,2,4 C. 1,2,5,4,3,7,6 Answer:nswer:. 1,5,7,6,2,4,3 Question 11: When setting passwords for vty 0 4, what are you setting a password for? A. Modem connections B. Line consoles Answer:nswer:. Telnet sessions D. Remote host router Question 12: What is an important function of the power-up self test (POST)? A. Causes other instructions to be loaded into memory Answer:nswer:. Executes diagnostics that verify the basic operation of router hardware C. Determines the router hardware and software components and lists them on th e console terminal D. Starts routing processes, supplies addresses for interfaces, and sets up me dia characteristics Question 13: Which password is encrypted in the configuration file by default? A. Console B. Enable Answer:nswer:. Enable secret D. Virtual terminal Question 14: Which command is used to backup the active configuration file from a router to a network server? A. copy tftp startup-config Answer:nswer:. copy running-configtftp C. copy tftp flash D. copy NVRAM tftp Question 15: What is an important result of the configuration file loading onto a router? A. Causes other instructions to be loaded into memory B. Executes diagnostics that verify the basic operation of router hardware C. Determines the router hardware and software components and lists them on th e console terminal Answer:nswer:. Starts routing processes, supplies addresses for interfaces, an d sets up media characteristics Question 16: Where is the configuration file saved when you complete the setup process? A. RAM B. ROM Answer:nswer:. NVRAM

D.

TFTP Server

Question 17: Once you have selected an interface to configure, which prompt would be on the s creen? A. Router(config)# B. Router(config-in)# C. Router(config-intf)# Answer:nswer:. Router(config-if)# Question 18: You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? A. banner msg Answer:nswer:. banner motd C. daily msg D. daily motd Question 19: Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? A. ESC Answer:nswer:. CTRL-C C. CTRL-ESC D. CTRL-SHIFT-6 , X Exam 7+8 Question 1: Which command is used to copy a system image to a network server? Answer:nswer:. Router#copy flash tftp B. Router#copy tftp flash C. Router(config)# copy flash tftp D. Router(config)# copy tftp flash Question 2: Which configuration register mode is used to tell the router to boot from ROM? A. 0x---0 Answer:nswer:. 0x---1 C. 0x---2 D. 0x---3 Question 3: Which command is used to tell the router to boot from flash? A. Router#boot flash IOS_filename B. Router#boot system flash IOS_filename C. Router(config)# boot flash IOS_filename Answer:nswer:. Router(config)# boot system flash IOS_filename Question 4: Which command can be used to check the amount of system memory available? Answer:nswer:. Router#show flash B. Router#show interface C. Router#show register D. Router#show running-config Question 5: In the Cisco IOS name cpa25-cg-1, what does cg represent? A. Where the image runs

B. Platform on which the image runs Answer:nswer:. Special capabilities and feature sets D. Whether the image has been compressed Question 6: Where will the router search for the IOS software if there are no boot system commands in NVRAM? A. ROM B. RAM Answer:nswer:. Flash D. TFTP server Question 7: Which command is used to change the default configuration register setting? A. Router#register value B. Router#config-register C. Router(config)#register value Answer:nswer:. Router(config)# config-register Question 8: Which command is used to tell the router to boot from ROM? A. Router#boot system rom B. Router#boot system rom IOS_filename Answer:nswer:. Router(config)# boot system rom D. Router(config)# boot system rom IOS_filename Question 9: Which command is used to tell the router to boot from a network server? A. Router#boot tftpIOS_filenameip address B. Router# boot system tftpIOS_filenameip address C. Router(config)# boot tftpIOS_filenameip address Answer:nswer:. Router(config)#boot system tftpIOS_filenameip address Question 10: Which configuration register is used on a Cisco 2500 series router during password recovery? A. 0x2100 B. 0x2101 C. 0x2102 Answer:nswer:. 0x2142 Question 11: You are upgrading the IOS on a router, which command would be used to copy the new IOS image from a network server? A. Router# copy flash tftp Answer:nswer:. Router#copy tftp flash C. Router#copy startup-configtftp D. Router# copy tftp startup config Question 12: Which of the following correctly describes a method for specifying how a router loads the Cisco IOS software? Answer:nswer:. Designate fallback sources for the router to use in sequence from NVRAM. B. Configure the Cisco IOS software image for the location where it will bootstrap. C. Manually boot a default system image at a virtual terminal. D. Manually boot a default system image at the network server.

Question 13: Which of the following is NOT part of the Cisco IOS naming convention? A. Where the image runs B. Platform on which the image runs C. Special capabilities and feature sets Answer:nswer:. Amount of space the file will use when copied to NVRAM Question 14: Which step should be performed before copying software between the TFTP host and Flash memory? A. Use the show Flash command to check connectivity to the server B. Check that you can see and write into RAM memory Answer:nswer:. Verify that there is sufficient room in Flash to accommodate th e IOS D. Check the configuration file name and location on the network server Question 15: In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? A. Where the image runs Answer:nswer:. Platform on which the image runs C. Special capabilities and feature sets D. Whether the image has been compressed Question 16: Where does the router search for the IOS software if the Flash is empty? A. ROM B. RAM C. NVRAM Answer:nswer:. TFTP server Question 17: Which of the following is provided by the show version command? A. Information about the IP addresses of the interfaces B. Information about the routing protocol Answer:nswer:. Information about the system image file D. Information about the default gateway Question 18: Which command is used to discover the configuration register setting? A. show register B. show running-config Answer:nswer:. show version D. show startup-config Question 19: Which command is used to configure a routing protocol? A. Router# rip network 192.11.10.0 Answer:nswer:. Router(config)# router rip C. Router(config)# routing rip D. Router(config)#routing protocol rip Question 20: Which configuration register mode is used to tell the router to boot from NVRAM? A. 0x---0 B. 0x---1 Answer:nswer:. 0x---2

D.

0x---N

Question 21: Which command can be used to check the boot field setting? Answer:nswer:. Router# show version B. Router# show register C. Router#show running-config D. Router# show startup-config Question 22: Which configuration register mode is used to tell the router to boot from ROM monitor mode? Answer:nswer:. 0x---0 B. 0x---1 C. 0x---2 D. 0x---3 Question 23: Which command is Answer:nswer:. B. Router#show C. Router#show D. Router#show Exam 9+10 Question 1: Which of the following best describes the TCP/IP protocol stack? A. Transfers information in a sequence of datagrams. Answer:nswer:. Enables communication among any set of interconnected networks. C. Maps closely to the OSI reference model in the upper layers. D. Reassembles datagrams into complete messages at the receiving location. Question 2: What is the purpose of ICMPs? A. They put the internetwork in control mode so that protocols can be set up. B. They are messages that the network uses to monitor connection protocols. C. They are standard binary messages that act as model internetwork protocols. Answer:nswer:. They are messages carried in IP datagrams used to send error an d control messages. Question 3: If a router has a serial interface S0, with IP address 107.85.20.2, using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? Answer:nswer:. 107.85.20.15 B. 107.85.20.255 C. 107.85.255.255 D. 107.255.255.255 Question 4: What will the source do if it is using a window size that is too large for the destination to handle and does not receive an acknowledgement from the destination? used to view the name of the system image file? Router#show flash register running-config startup-config

Answer:nswer:. Resend the data B. Stop sending data C. Confirm the window size with the destination D. Query the destination to see if the line is still up Question 5: If you want to turn off the name-to-address translation in the router, which command would you use? A. no ip host B. no ip address C. no ip name-search Answer:nswer:. no ip domain-lookup Question 6: If you want to specify one or more hosts that supply host name information, which command would you use? A. ip host B. ip address Answer:nswer:. ip name-server D. ip domain-lookup Question 7: In the output of show hosts , what does perm mean? A. The entry has not yet expired. B. The entry was acquired from DNS use. C. The entry was learned from DNS and now has permanent status. Answer:nswer:. The entry was manually configured in a static host table. Question 8: What provides sequencing of segments with a forward reference acknowledgment, numbers datagrams before transmission, and reassembles the segments into a complete message? A. Simple UDP acknowledgment B. Expectational acknowledgments Answer:nswer:. TCP sequence and acknowledgment numbers D. Header checksums and data protocol checksums Question 9: Which protocol is found in the Transport Layer? A. IPX B. LLC C. RIP Answer:nswer:. UDP Question 10: What is the purpose of the protocol field? A. Allows dynamic generation of source protocols B. Changes other protocols so that they can be used by IP C. Numbers the Layer 3 protocol and makes it similar to a port number Answer:nswer:. Determines the Layer 4 protocol being carried within an IP datagram Question 11: What does the response * mean, when it comes in response to the trace command A. The network refused the trace. Answer:nswer:. Timed out waiting for trace reply. C. The destination device refused the trace. D. The source used a trace that was not supported by the network protocol.

Question 12: If you want to associate a name with an IP address, such as asu 129.219.2.1, what command structure would you use? A. ip name asu 129.219.2.1 Answer:nswer:. ip host asu 129.219.2.1 C. ip host name asu 129.219.2.1 D. ip host address asu 129.219.2.1 Question 13: What best describes the function of broadcast addresses? Answer:nswer:. Used to send a message to all nodes on a network/subnet. B. Used to send a message to a single network destination. C. Used to send a message to every node the router has access to. D. Used to send a message to every router on a network in a WAN. Question 14: Which command locates path failures from the source to destination? A. ARP B. Ping Answer:nswer:. Trace D. Telnet Question 15: What is the function of ARP? A. It is used to map a known MAC address to an unknown IP address. B. It is used to develop a cached Layer 4 address resource table. Answer:nswer:. It is used to map a known IP address to an unknown MAC address. D. It sends a broadcast message looking for the router IP address

Question 16: If a device on a network does not know its Layer 3 address how can it find it? A. ARP Answer:nswer:. RARP C. Sends an alert to the network administrator. D. Broadcasts a request to the Domain Name Server (DNS) for help. Question 17: If Host A is setting sends a segment with to send back to Host A. n B. n1 C. n + n Answer:nswer:. n + up a three-way handshake with Host B, and Host A sequence number n to Host B, what is Host B going A as an acknowledgment?

Question 18: Which of the following best describes TCP/IP? A. 7 Layer Model that enables communication among any set of interconnected networks B. Proprietary protocol that can only be used with WANs C. Proprietary protocol that can only be used with LANs Answer:nswer:. Allows communication among a variety of interconnected networks and can be used in both LANs and WANs Question 19: What is one way port numbers are used?

A. Source systems generate port numbers to predict destination addresses. Answer:nswer:. To keep track of different conversations crossing the network a t the same time. C. Source systems use port numbers to keep session organized and to select the proper application. D. End systems use port numbers to dynamically assign end users to a particular session, depending on their application use. Question 20: What is the purpose of ICMP testing? Answer:nswer:. Determines if messages reach their destination B. Makes sure that all activity on the network is being monitored C. Determines if the network is in privileged mode or user mode Question 21: Which layer in the TCP/IP model includes file transfer, e-mail, remote login, and network management? Answer:nswer:. Application B. Transport C. Internet D. Network Question 22: How does the Cisco IOS software deal with name-to-address mappings? A. It does not use name-to-address mappings. B. It takes each IP address and assigns a unique name to it. C. It identifies the subnet mask being used at the destination site and routes data there. Answer:nswer:. It maintains a cache of host name-to-address mappings for use b y commands. Question 23: A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the destination host? A. 172.16.1.0 B. 172.16.4.0 Answer:nswer:. 172.16.8.0 D. 172.16.12.0 Question 24: At which Layer of the OSI model would flow control problems exist? A. Application B. Presentation C. Session Answer:nswer:. Transport Question 25: How are IP addresses usually expressed? A. Binary code B. 4 octet subnet mask Answer:nswer:. 32-bit dotted decimal D. Transmission control protocol Exam 11 1 Which kind of route is set when the next hop is not explicitly listed in the r

outing table? Dynamic Answer: Default Passive Incremental 2 How can the count to infinity problem be prevented? By using routing loops By defining a minimum hop count By increasing router memory Answer:nswer:y using hold-down timers 3 Information regarding routes has been received on a router through interface A . Which routing technique will prevent this information from exiting on the rout er through the same interface A? Dynamic routing Answer:Split horizon Static routing Hold down timers 4 How are link-state routing updates triggered? By timers Answer:nswer:y topology changes By protocol changes By changing the NIC 5 What is one disadvantage of dynamic routing? Answer:Requires lots of active network administrator management Can reveal everything known about an internetwork Must be reconfigured if the network is changed or stations are added Cannot compensate for network failures so crashes can be a recurring problem 6 Which protocol is a link-state routing protocol? EIGRP Answer:OSPF RIP IGRP 7 Which metrics are commonly used by routers to evaluate a path? EMI load, SDLC connections, deterioration rate Answer:nswer:andwidth, load, reliability Distance, hub count, SN ratio Signal count, loss ratio, noise 8 Which routing protocol maintains a complex database of topology information an d uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 9 Which best describes convergence?

When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork When several messages are being sent to the same destination 10 Which term describes the situation where packets never reach their destinatio n but instead cycle repeatedly through the same group of network nodes? Split horizon End to end messaging Convergence Answer:Routing loop 11 Which routers exchange information when using a distance-vector routing proto col? All All in network All in subnetwork Answer:Only neighbors 12 What is one disadvantage of static routing? Requires a name server on each network Routing of data stops while routers exchange routing tables Answer:The network administrator must manually update the routing table wheneve r a topology change occurs Tends to reveal everything known about an internetwork 13 Which OSI Layer is responsible for path determination? 1 2 Answer:3 4 14 What is one advantage of dynamic routing? Takes little network overhead and reduces network overhead traffic Reduces unauthorized break-ins as security is tight Answer: Adjusts automatically to topology or traffic changes Requires very little bandwidth to operate efficiently 15 What will happen if routers have different sets of LSAs? A check sum procedure is initiated and faulty routing tables repaired. Answer:Routes become unreachable because routers disagree about a link. A comparison is forced and subsequent convergence on a single routing table occ urs. A broadcast message is sent with the master copy of the routing table to all ro uters. 16 What do distance vector algorithms require of routers? Default routes for major internetwork nodes in case of corrupted routing tables Answer:Periodically send its routing table to its neighbors Fast response times and ample memory

Maintain a full database of internetwork topology information 17 What does a router use to identify the destination network (LAN) of a packet within an internetwork? MAC address Port address SPX address Answer:Network address 18 Which protocol is a hybrid routing protocol? Answer:EIGRP OSPF RIP IGRP 19 What is a network with only one path to a router called? Static network Dynamic network Entity network Answer:Stub network 20 Which part(s) of an IP address is used by the router for path determination? Answer:Network Network and client Network, subnetwork, and host Network, subnetwork, host, and subnet mask 21 Which metric measures the passage of a data packet through a router? Exchange Answer:Hop Transmittal Signaling Exam12 1 Which command should identify destination network addresses and next hop pairs ? Router(config)# show ip protocol Router#show ip table Answer:Router> show ip route Router(config-router)# show ip table 2 Which task is configured globally? Addressing IP network numbers by specifying subnet values Answer:Selecting a routing protocol like RIP or IGRP Assigning network/subnet addresses and the appropriate subnet mask Setting up a routing metric to find the best path to each network 3 Which command specifies the directly connected networks after an IP routing pr otocol has been enabled? Router(config-if)> network network number Router(config)# network network number

Answer:Router(config-router)# network network number Router(config-router)# network ip address subnet mask 4 If a new LAN is added to an internetwork, which command would add the network to the routing table? Router (config)>ip route 2.0.0.0 255.0.0.0 via 1.0.0.2 Answer:Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Router (config)# ip route 2.0.0.0 via 1.0.0.2 Router (config)# ip route 2.0.0.0 1.0.0.2 using 255.0.0.0 5 After using the router igrp command, why is it necessary to use the network su bcommand? It displays the contents of the network routing table It allows each router to send its routing table in routing updates to all the n etworks It displays the status and global parameters associated with a network Answer:It specifies any directly connected networks to be included in routing t able updates 6 Which metric is used in RIP? Bandwidth Delay Answer:Hop count Traffic load 7 Which routes are automatically determined by the routers? Static routes Default routes Answer:nswer:ynamic routes Gateway routes 8 Which type of route is used when no other routes are known to the destination? Static Answer:nswer:efault Dynamic Next available 9 How often are RIP updates broadcast? Every 15 seconds Answer:Every 30 seconds Every 60 seconds Every 90 seconds 10 What is the purpose of the ip default-network command? Answer:It is used to establish a default route It is used to save time when setting up the routing table It is used to save bandwidth when sending large datagrams It is used to keep routing table short and organized 11 What is used to measure the trustworthiness of a route? Reliability index Number of hops

Answer:nswer:dministrative distance Available bandwidth 12 At which OSI Layer would an incorrect subnet mask on an interface be classifi ed? Layer 4 Answer:Layer 3 Layer 2 Layer 1 13 Which variable is used by IGRP? Answer:nswer:andwidth File size Hop length Time span 14 Which type of system occurs when routers are grouped under a common administr ation? Default Answer:nswer:utonomous Static Dynamic 15 At which Layer of the OSI model would you classify the loss of network connec tivity due to a loose patch cable? Layer 7 Layer 5 Layer 3 Answer:Layer 1 16 Which command should display RIP routing updates as they are sent and receive d? Router#show ip rip Router#debug ip protocols Answer:Router# debug ip rip Router# show ip rip update 17 What is the purpose of exterior routing protocols? To transmit between nodes on a network To deliver information within a single autonomous system Answer:To communicate between autonomous systems To set up a compatibility infrastructure between networks 18 What type of route is configured with the command: ip route 172.16.1.0 255.25 5.255.0 172.16.2.1 Answer:Static Default Dynamic Gateway 19 What is the interval of IGRP routing updates?

30 seconds 60 seconds Answer:90 seconds 120 seconds 20 At which OSI Layer would an incorrect encapsulation type on a serial interfac e be classified? Layer 4 Layer 3 Answer:Layer 2 Layer 1 21 Which mode is entered if a valid startup-configuration file is not found afte r the IOS image is loaded? Answer:Setup Static Dynamic Automatic Exam final: 1 What provides sequencing of segments with a forward reference acknowledgment, numbers datagrams before transmission, and reassembles the segments into a compl ete message? Simple UDP acknowledgment Expectational acknowledgments Answer:TCP sequence and acknowledgment numbers Header checksums and data protocol checksums 2 Which command will restart CDP if it has been disabled on the interface of a r outer? Activate CDP Answer:nswer:DP enable Enable CDP Enable interface 3 Which statement is true of the count to infinity problem in routing loops? It is caused by the split horizon problem. It is a result of the packet's TTL value becoming too great. Only routers that use hybrid routing can overcome this problem. Answer:Routers that use hold down timers can overcome the problem. 4 What is the purpose of the IOS enable secret command? To allow the user to establish password protection on incoming Telnet sessions To allow the user to establish password protection on the console terminal To enable the user to access the User mode Answer:To enable the user to enter a password that will be encrypted 5 How are link-state routing updates triggered? By timers Answer:nswer:y topology changes By protocol changes By changing the NIC

6 Which item best describes the difference between a routed protocol versus a ro uting protocol? Routed protocols are used between routers to maintain tables while routing prot ocols are used to carry user data. Routed protocols use distance vector algorithms while routing protocols use lin k-state algorithms. Answer:Routed protocols are used to carry user data while routing protocols mai ntain tables. Routed protocols use dynamic addressing while routing protocols use static addr essing. 7 Which type of network would typically use a static route for external traffic? Fully meshed network Multihomed network Network with frequent topology changes Answer:Stub network 8 What determines how much data a receiving station running TCP/IP can accept be fore sending an acknowledgment? Protocol size Sequence numbers Transmission rate Answer:Window size 9 Which term refers to the amount of data that can be transmitted before receivi ng an acknowledgement? Answer:window size closed connection two way handshake expectational acknowledgement 10 If a router has a serial interface S0 with IP address 107.85.20.2 using a sub net mask of 255.255.255.240, what is the broadcast address used for hosts on thi s subnet? Answer:107.85.20.15 107.85.20.255 107.85.255.255 107.255.255.255 11 Which device is normally an example of data circuit terminating equipment (DC E)? Answer:Modem Computer Router Multiplexer 12 Which command can be used to check the boot field setting? Answer:Router#show version Router#show register Router#show running-config Router# show startup-config

13 Which command is used to backup the active configuration file from a router t o a network server? copy tftp startup-config Answer:nswer:opy running-configtftp copy tftp flash copy tftp NVRAM 14 What is the function of the reload command? Answer:It reboots the router It saves the new IOS to Flash memory It loads a new configuration file in NVRAM It loads a configuration file from a TFTP server 15 Which statements are true when configuring a router to operate with RIP? At the global configuration prompt issue the command "router rip." Then set up the IP address and subnet mask on each interface. Answer:nswer:t the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly c onnected network. At the global configuration prompt issue the command "rip." Then use the "netwo rk" command to indicate which network(s) to advertise. At the global configuration prompt issue the command "enable rip routing." Then set up the IP address and subnet mask on each interface. 16 What is a typical OSI layer 2 error? Broken cable Cable connected to the wrong port Answer:Improper clock rate settings on serial interfaces Incorrect subnet mask 17 What is the first step a Cisco router performs after it is powered up? Empties contents of NVRAM Looks for the configuration file Answer:Performs a POST Starts the operating system 18 Which type of protocol controls how and when routers communicate with neighbo ring routers? Media access layer protocol Routed protocol Answer:Routing protocol Transport protocol 19 Which item best defines the ping command? Checks for connectivity at the application layer. Answer:Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Uses TTL values to generate messages from each router used along a path. Verifies the sliding window is set up properly. 20 Which configuration register mode causes a router to boot from the ROM monito r mode?

Answer:0x---0 0x---1 0x---2 0x---3 21 Which metric is used in RIP? Bandwidth Delay Answer:Hop count Traffic load 22 What is exchanged to provide communication between two hosts' source and dest ination OSI peer layers? Packet datagrams Answer:Packet data units Protocol datagrams Protocol data units 23 Which router component provides working memory for configuration files and ro uting tables? Answer:RAM ROM Flash NVRAM 24 Which listing BEST describes commands that can be used to test a network? Show ip route, Show ip route, Show ip route, Answer:Show ip show interfaces, debug, telnet, network test, ping show interfaces, trace, ping, display network, debug debug, trace, ping, telnet, show ip trace route, show interfaces, debug, trace, ping, telnet

25 How can a router learn a path to a destination? ARP tables DNS entries Answer:nswer:ynamic routing Temporary routing 26 Which routing protocol maintains a complex database of topology information a nd uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 27 Which statement is true concerning port addressing? TCP ports 0-255 are for private applications TCP ports above 1023 are for marketable applications Answer:UDP ports 0-255 are for public applications UDP ports 256-1023 are unregulated 28 Which level of Cisco IOS allows only view status? Answer:User mode

Enable mode Privileged mode Global configuration mode 29 What is an example of a global parameter? IP address Network number Answer:Router host name Subnet mask 30 If a new LAN is added to an internetwork, which command would add the network to the routing table? Router (config)>ip route 2.0.0.0 255.0.0.0 via 1.0.0.2 Answer:Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Router (config)# ip route 2.0.0.0 via 1.0.0.2 Router (config)# ip route 2.0.0.0 1.0.0.2 using 255.0.0.0 31 Which command is used to configure a routing protocol? Router#rip network 192.11.10.0 Answer:Router(config)# router rip Router(config)# routing rip Router(config)# routing protocol rip 32 Which command will display statistics for all interfaces configured on the ro uter? List interfaces Answer:Show interfaces Show processes Show statistics 33 What is used by a routing protocol to determine the best path to include in t he routing table? Convergence time Default distance Answer:Metric Type of router 34 A router received a packet with a destination address of 172.16.14.228. Assum ing a subnet mask of 255.255.248.0, what is the subnet network address for the d estination host? 172.16.1.0 172.16.4.0 Answer:172.16.8.0 172.16.12.0 35 Where does a router search for an IOS image if none is found in flash? RAM ROM Answer:TFTP NVRAM 36 What is used by distance-vector routing protocols?

A topological database Link-state advertisements Answer:Periodic updates of entire routing table Shortest path first algorithms 37 Which layer of the TCP/IP model corresponds to the OSI network layer? Application Answer:Internet Network Interface Transport 38 Which two layers of the OSI model are described by WAN standards? Application Layer, Physical Layer Answer:nswer:ata Link Layer, Physical Layer Data Link Layer, Transport Layer Physical Layer, Network Layer 39 From the following list, what is the correct order of data encapsulation? 1. Segments2. Bits3. Packets4. Frames Answer:1-3-4-2 2-1-3-4 2-3-4-1 3-1-2-4 40 Which condition best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork When several messages are being sent to the same destination 41 What is the result of executing the erase startup-config command? It deletes the active configuration file from RAM. Answer:It deletes the backup configuration file in NVRAM. It deletes the saved configuration file from ROM. It deletes the saved configuration file from the C:\ drive. 42 Which name is given to a group of routers under a common administration that present a consistent view of routing to the external world? Answer:nswer:utonomous system Corporate system Domain name system Interior network system 43 Which Cisco IOS command displays routing table entries? ping trace Answer:show ip route show interface 44 What is a characteristic of IGRP? It is a link state routing protocol.

Routing updates are broadcast every 30 seconds. The maximum hop count is 15. Answer:The metric for path selection is a composite metric using bandwidth and delay. 45 When sending data to a host on a different network, which address does the so urce host encapsulate in the IP header? IP address of the router MAC address of the router MAC address of the destination device Answer:IP address of the destination host 46 Which command causes a router to boot from ROM? Router#boot system rom Router#boot system rom IOS_filename Answer:Router(config)# boot system rom Router(config)# boot system rom IOS_filename 47 Which metrics are commonly used by routers to evaluate a path? EMI load, SDLC connections, deterioration rate Answer:nswer:andwidth, load, reliability Distance, hub count, SN ratio Signal count, loss ratio, noise 48 Which command is used to download a new system image file from a TFTP server to a router? Copy flash tftp Copy nvramtftp Answer:nswer:opy tftp flash Copy tftpnvram 49 Which keys are pressed in the escape sequence to terminate the initial config uration while in setup mode? ESC Answer:nswer:TRL-C CTRL-ESC CTRL-SHIFT-6 , X 50 How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? 18 19 Answer:20 21 51 Which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? Layer 4 Layer 3 Answer:Layer 2 Layer 1 52 Which command is used to turn off the name-to-address translation in a router ?

no ip host no ip address no ip name-search Answer:Answer:no ip domain-lookup 53 Which representations have the same meaning when representing the subnet mask ? /10 and 255.224.0.0 /15 and 255.255.0.0 Answer:/21 and 255.255.248.0 /24 and 255.255.0.0 Book3 Chapter 2 1. What will be generated when the first Ethernet station detects a collision? NACK CRC misalignment message Reset broadcast Answer:Jam signal 2. Which switch type provides connections between ports of like bandwidth? Asymmetric Port-centric Programmable Answer:Symmetric 3. Which area of memory does the switch use to store destination and transmissio n data? Storage partition Delay queue Answer:Memory buffer Memory queue 4. Full duplex requires how many pairs of wires? 1 Answer:2 3 4 5. What is read by a switch to begin the forwarding process and reduce latency? Frame trailer Answer:Destination MAC address Source MAC address Checksum 6. Switches on a LAN allow the network administrator to do which of the followin g? Maintain a shared network segment Decrease the number of collision domains Prevent microsegmentation Answer:Increase the number of collision domains 7. What occurs each time a switch stores an address? Checks the subnet mask Answer:Time stamps it Places it in the routing table

Clears the routing table 8. Which OSI layer does a router use to make its forwarding decisions? 1 2 Answer:3 4 9. The implementation of switching technology helps to decrease congestion by re ducing traffic and increasing which of the following? Attenuation Answer:Available bandwidth Routing protocols Propagation 10. How do VLANs group network devices? Physically Answer:Logically Geographically Topographically 11. What protocol is used to allow redundant paths in a switched/bridged network ? RIP Answer:Spanning Tree IGRP ISL 12. What type of switching method is used when a switch only reads the destinati on address before forwarding the frame? Answer:Cut-through Read and send Copy and send Store-and-forward 13. A LAN switch allows many users to communicate in parallel through which of t he following? Routing tables Multipoint protocols Collision domains Answer:Virtual circuits 14. Switches that receive the entire frame before sending it, use what type of f rame forwarding? Cut-through Receive and send Copy and send Answer:Store-and-forward 15. Which Layer 1 device is used to extend the coverage area of a LAN segment? Router Switch Answer:Repeater Gateway 16. Which of the following is the default order of Spanning Tree Protocol states ? 1. Learning 2. Disabled

3. Blocking 4. Listening 5. Forwarding Answer: 3, 4, 1, 5, 2 4, 3, 1, 2, 5 2, 1, 4, 3, 5 1, 4, 3, 5, 2 17. Which of the following improves the performance of a shared media LAN? Answer:Segmenting the network Moving the workstations closer together Installing a more powerful server Installing more servers and printers 18. What is used to alleviate congestion? Install more hubs Use an extended star Use a bus topology Answer:Increase the bandwidth 19. Bridges learn about a network by building a table based on which of the foll owing? Answer:MAC addresses IP addresses ARP requests RIP requests 20. What percentage of bandwidth is available in each direction when using fullduplex? 50% 75% Answer:100% 125% 21 Which of the following does a switch use to make forwarding decisions? Network layer information Transport layer information Answer:A MAC address An IP address Chapter 3 1. Users may be reassigned to different VLANs using which of the following? Hubs Answer:Software Routers Bridges 2. Which device is used to reduce or eliminate broadcast related problems? Bridges Answer:Routers Passive hubs Active hubs 3. According to the IEEE, what is the acceptable way to implement VLANs? Grouping Filtering Source bridging

Answer:Frame tagging 4. A VLAN makes up a switched network that is logically segmented by all of the following EXCEPT: Answer:Collison domains Functions Applications Project teams 5. What is the term used when switch ports are automatically assigned to a VLAN? Answer:Dynamic Static Port-centric Default 6. What is a VLAN used to create? Autonomous systems Answer:Broadcast domains Network Sectors Virtual sections 7. What is an effective preventative measure used with segmentation to prevent b roadcast related problems? Answer:Firewalls LANs WANs Bridges 8. What would be the preferred type of link of a VLAN backbone? slow serial low capacity 56 Kbps Answer:High bandwidth 9. What is the term used when ports on a switch are administratively assigned to a VLAN? Answer:Dynamic Static Default Polled 10. A VLAN is based on which type of grouping? Answer:Logical Physical Star Ethernet 11. How can access be controlled on a secured VLAN? Station address Protocol types Application types Answer:All of the above 12. Which technique examines particular information about each frame? Latency Frame resolving Answer:Frame filtering Store and forward 13. Dynamic VLANs can be based on which of the following?

MAC addresses Protocol type Logical addressing Answer:All of the above 14. Frame tagging functions at what OSI layer? Answer:2 3 1 4 15. Which of the following do VLANs use to make filtering and forwarding decisio ns? Packets Answer:Frames Presentation header Network design 16. The smaller the VLAN, the smaller the number of users that are affected by w hich of the following? Packet filtering Switch latency Framing Answer:Broadcasts 17. What technique does 802.1q use to implement VLANs? Grouping Filtering Source bridging Answer:Frame tagging 18. What is a benefit of using VLANs? Extended collision domains Increased administration Multiple cable runs Answer:Tighter network security 19. When logically segmenting your network with VLANs, what type of device do yo u need to ensure proper communication between the VLANs that are created? Switch Bridge Hub Answer:Router 20. Which of the following VLAN types require changes by the network administrat or but are easy to configure, and straightforward to monitor? Dynamic Answer:Static Cut-through Store-and-forward 21. Frame tagging places a unique identifier in the header of each frame as it i s forwarded across the network __________. microsegment LAN Answer:backbone WAN Chapter 4

1. Which of the following results in network microsegmentation? Using only hubs for connectivity Removing bridges from the network Answer:Using switches for connectivity Adding more computers on a single segment 2. Which of the following devices establishes a bandwidth domain also known as t he collision domain? Repeater Answer:Switch Active hub Passive hub 3. The star/extended star topology uses what type of standard? Token ring Answer:Ethernet 802.3 Ethernet 802.5 ARCNET 4. What is the ability to expand the network without having to perform any major changes to the overall design? Functionality Manageability Operability Answer:Scalability 5. Which of the following is NOT a factor when configuring an intranet? Type of data to be accessed Server privileges Answer:Providing public access Outfitting desktops with faster connectivity 6. Where should workgroup servers be placed? MDF POP VCC Answer:IDF 7. Internetwork design seeks to provide the greatest availability for the least _________. design time Answer:cost network downtime installation time 8. Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer:Develop LAN topology Track information flow List applications in use Address performance issues 9. Which of the following is NOT true about logical and physical network maps? Give a snapshot of the network Help troubleshoot Answer:Show which routing protocol is used Show subnet mask and router name 10. Which device is one of the most common Layer 2 devices? Answer:LAN switch

Active hub Passive hub Router 11. Which of the following results from the use of bridges and switches for segm entation? Multiple broadcast domains A single collision domain A larger overall network Answer:Multiple collision domains 12. What is the most important Layer 1 issue to consider when designing a networ k? VLAN layout Answer:Physical cable plan Router layout Switch segmentation 13. What is the current standard for the bandwidth connecting MDF to IDF in Mbps ? 1 10 Answer:100 150 14. What is the first step in LAN design? Answer:Establish the design goals Estimate the design cost Determine the network users Determine the physical size 15. In a pure LAN switch environment, what is the size of the collision domain? All hosts Four hosts Answer:Two hosts The number of hosts in the broadcast domain 16. What can routers provide when used between VLANs? Answer:Communication No services Larger collision domains Additional availability of MAC addresses 17. Which of the following is allowed by asymmetric switching? Shared switching on a segment Answer:Connections of unlike bandwidth Dedicated uplink connectivity Like bandwidth connections 18. What do VLANs provide? Physical networks Larger broadcast domains Decreased security Answer:Broadcast containment 19. Which of the following devices is associated with one broadcast domain per p ort? Switch Active hub Answer:Router

Bridge 20. What type of network segmentation do routers allow? Logical and Incremental Answer:Logical and Physical Virtual and Physical Virtual and Logical 21. When creating multiple wiring closets in a totally switched environment, wha t else is always created? Answer:Multiple catchment areas Multiple broadcast domains Multiple MDFs Multiple LANs 22. What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? 3 m Answer:6 m 9 m 10 m 23. What is the effect of a switch on bandwidth? Answer:Dedicates bandwidth Shares bandwidth Decreases bandwidth Eliminates bandwidth 24. What is used to create multiple physical networks in a structured Layer 1 wi ring scheme? Answer:Patching the horizontal and vertical cabling into an appropiate layer 2 switch Using a router Connecting the MDF to the IDF Patching fiber optic cable to coaxial cable Chapter 5 1.Which OSI layer is responsible for finding the best path through the internetw ork? 1 2 Answer:3 4 2.What is a router's main responsibility when routing packets? Traffic control Collision avoidance Enforcing security Answer:Path determination 3.What do routers use to make forwarding decisions? Answer:Routing tables VLANs WAN connectivity Proximity 4. Which of the following refers to the number of routers a packet must pass thr

ough? Bandwidth Answer:Hop count Tick count Delay 5. What two parts can most protocol addressing schemes be broken down into? TCP and IP IPX and SPX Network and broadcast Answer:Network and host 6.What allows a router to accept a packet on one interface and forward it to ano ther interface? Broadcast forwarding Answer:Switching function Filter and control function Path determination 7. What do routers use to communicate with other routers? Broadcast forwarding IP Tunneling Answer:Routing protocols Routed protocols 8. Entries made by an administrator to manipulate a routing table are referred t o as which of the following? Answer:Static routes Dynamic routes ARP tables Routing tables 9. Distance-vector routing begins by identifying which directly connected entity ? Routers Ports Switches Answer:Networks 10. Which routing protocol is used to communicate between autonomous systems? RIP Ethernet Token Ring Answer:Exterior routing protocols 11. 1. 2. 3. 4. 5. Which of the following are primary goals of routing protocols? Point-to-multipoint routing Rapid convergence Efficiency Flexibility Microsegmentation

1, 2, 3 Answer:2, 3, 4

3, 4, 5 1, 3, 5 12. What causes routing loops? Path determination is optimized Hop count is set below 50 Convergence is present Answer:Routing tables have not converged 13. What type of information is automatically adjusted as topology changes occur ? Static routes Answer: Dynamic routes ARP tables RARP tables 14. What does dynamic routing rely on? Maintenance of an ARP table Accurate entry of static routes Answer:Accurate routing tables Collision forwarding 15. For dynamic routing to work properly what must routers send to other routers ? ARP requests RARP packets Static routes Answer:Timely updates 16. Which of the following is another term for shortest path first routing algor ithm? Source bridging Store-and-forward Distance-vector Answer:Link state 17. Which of the options below gives two basic steps required when configuring a routing protocol? 1. Configure the interface 2. Enable the routing protocol 3. Disable routing updates 4. Add the network numbers 1, 2 2, 3 Answer:2, 4 3, 4 18 . What passes periodic copies of routing tables from router to router? Link state Answer:Distance vector Store-and-forward Cut-through

19. Which of the following is a Cisco proprietary protocol? Answer:IGRP RIP OSPF ISIS 20. Routers under a common administration are said to belong to what? A WAN A LAN Answer:An AS An SNMP 21. Select the correct IOS command for configuring IGRP as the routing protocol. RouterAnswer:routerigrp 100 Router(config-router)>router igrp 100 Answer:Router(config)Answer:router igrp 100 Router(config-if)Answer:set router igrp 100 22.At what time interval does IGRP send routing updates? 120 seconds 30 seconds 60 seconds Answer:90 seconds 23. What is the maximum hop count associated with IGRP? 15 50 100 Answer:255 Chapter 6: ACLs 1. Which of the following must be configured on a router in order to deny packet s based on specific tests? Answer:Access lists RIP IGRP Source routing 2. When using a standard access list, which of the following criteria can router s use for filtering packets? MAC address Port numbers Specific protocols Answer:Source address 3. Which type of access list uses the number range 100-199? IPX standard AppleTalk IP standard Answer:IP extended

4. A wildcard mask bit of "1" means that the corresponding bit must be _________ __. checked Answer:ignored deleted passed 5. Which order are the statements in an access list processed to determine wheth er packets should be processed or discarded? From bottom of the list up In random order By prioritizing the incoming packets Answer:In sequential order 6. What happens to a packet that does not match any of the tests in an access li st? Answer:It is discarded. It is sent to the recipient. It is stored until the access list is updated. It is returned to the sender. 7. What is the final step in implementing an access list? Answer:Apply the access list to one or more interfaces. Set the parameters for the access list tests. Determine the state of the access list. None of the above 8. What type of access list would you use to permit or deny specific protocols w ithin the IP suite? Answer:Extended Protocol suite Specific Standard 9. IP access lists use which of the following to determine which address bits ar e examined? Subnet masks Network masks Host IDs Answer:Wildcard bits 10. Which wildcard mask would match the host range for the subnet 192.16.5.32 /2 7? 0.0.0.32 0.0.0.63 0.0.63.255 Answer:0.0.0.31 11. What would the wildcard mask be to deny traffic only on network 195.67.52.0? 0.0.255.255 255.255.255.0

Answer:0.0.0.255 255.255.0.0 12. In an access list, what word can replace 0.0.0.0 255.255.255.255? Permit Accept Answer:Any All 13. Which type of access list would permit or deny part of a protocol suite? Standard General Specific Answer:Extended 14. Which command is used to keep track of how many packets were permitted or de nied based on an access-list? eq establish ack Answer:log 15. Along with the packet type, Cisco IOS access lists also check what? Physical layer headers Answer:Upper layer headers Lower layer headers Data link headers 16. What is a possible use of ACLs? Increased network traffic Decreased security Answer:Packet filtering Decreased latency 17. Which port number is used for DNS? 21 33 52 Answer:53 18. Which ACL would permit everyone to telnet to router 192.168.5.2? router-a(config)Answer:access-list 102 permit ip any host 192.168.5.2 eq 23 router-aAnswer:access-list 102 permit ip any host 192.168.5.2 eq 23 Answer:router-a(config)Answer:access-list 102 permit tcp any host 192.168.5.2 e q 23 router-aAnswer:access-list 102 permit tcp any host 192.168.5.2 eq 23 19. Where should standard access lists be set? Close to the source Answer:Close to the destination On any router in the network Midway between source and destination

20. Access lists can be applied to traffic flowing in which direction? Inbound only Answer:Both inbound and outbound Outbound only Serial only 21. Which Cisco IOS command allows you to view the placement of an access list? show access list show access-group Answer:show ip interface show interface Chapter 7: Novell IPX 1. How do you obtain an IPX network address? Apply to InterNIC Use DHCP Add the address with the subnet mask Answer:Obtain it from the network administrator 2. Which frame types are compatible with the Cisco IOS name Novell-ether? Ethernet_II Ethernet_802.2 Ethernet_SNAP Answer:Ethernet_802.3 3. Which command is used to display IPX routing tables? show ipx servers Answer:show ipx route show ipx traffic show ipx interface 4. When using multiple encapsulations on an interface, what must be assigned? Multiple protocols Answer:Multiple network numbers Multiple subnet masks Multiple SAP types 5. Which of the following commands enables IPX routing? ipx maximum-paths Answer:ipx routing ipx network router novell-rip 6. What is the encapsulation type on a router for a Novell network running versi on 3.12? Novell-ether ARPA SNAP Answer:SAP 7. What do NetWare clients use to find NetWare servers?

GNS packets Answer:SAP packets RIP packets SPX packets 8. What do routers do with SAP packets? Answer:Build a SAP table Discard the SAP packets Forward the SAP packets Send them to a SAP server 9. Where does the response to a GNS request come from if there is both a Cisco r outer and a NetWare server on the same LAN? Router Answer:Local NetWare server Local SAP server Switch 10. When configuring interfaces for IPX, what must be assigned to each interface ? IP address Host address Answer:Network number Subnet mask 11. What is the default WAN tick metric for IPX networks? Five Answer:Six Seven Eight 12. Which Cisco IOS command is used to check IPXSAP updates? show sap routing updates show sap routing activity Answer:debug ipx sap activity debug sap routing activity 13. Which configuration command is used to set the number of routes used for loa d sharing? ipx routing ipx networks Answer:ipx maximum-paths router rip 14. Where are SAP tables stored? On workstations and servers Answer:On routers and servers On routers and workstations On routers only 15. What type of protocol is IPX? Connection-oriented Answer:Connectionless

Nonroutable Connection like 16. Why would you use the command IPX maximum-paths? To define the maximum hops To specify the number of routes available Answer:To provide load sharing To increase the tick count 17. What does IPX use in the host portion of an address to eliminate the use of ARP requests? SAP SPX Answer:MAC RARPs 18. What is correct regarding the node number using Novell's IPX addressing sche me? 80 bits long Written in decimal Answer:Same as the MAC address Number assigned by an administrator 19. Select the command that you would use to check IPX routing updates. show ipx routing updates show ipx routing activity Answer:debug ipx routing activity debug ipx rip 20. Which of the following occurs when a router running Novell RIP has two equal paths to a network? Selects the route with the lowest hop count. Discards the packet. Forwards the packet out the default route. Answer:Implements load sharing. 21. Which metrics does Novell RIP use? Bandwidth and delay Answer:Ticks and hop count Distance and cost Size and throughput 22. What is the default type of routing protocol used by Novell NetWare? Link-state Answer:Distance vector Hybrid OSPF 23. Which IPX routing command is used to show the number and type of packets rec eived and transmitted by the router? show ipx servers show ipx route Answer:show ipx traffic show ipx interface

Chapter 8: Network management 1. A peer-to-peer network is also known as what type of network? Client-server Thin client Answer:Workgroup Home office 2. Which of the following redundancy techniques uses disk striping with parity a nd requires a minimum of three disks? RAID 0 RAID 1 RAID 4 Answer:RAID 5 3. Which of the following would NOT be found on security documentation? User rights Firewall support Answer:Software listings Physical access to the network 4. Which command will test the loopback function on the NIC? Answer:Ping 127.0.0.1 Telnet 127.0.0.1 Ping 127.0.0.0 Telnet 127.0.0.0 5. Which device controls voltage spikes and HF noise? Surge Suppressor Answer:Isolating transformer Regulator Wall outlet 6. Which of the following is NOT associated with a peer-to-peer network? Easily shared resources No additional software is required Requires a dedicated server Less expensive to create 7. Which of the following is used to keep a list of equipment repairs? Security record Software record Answer:Maintenance record Policy record 8. Which of the following reports would be used to determine what programs are i nstalled on a particular computer? Answer:Software Server Network Workstation 9. Which of the following is the most critical component of good network adminis tration? Security Performance Answer:Documentation Backbone

10. What is the least implemented component of network administration? Security Performance Answer:Documentation Baselining 11. What is a solution to the problem of EMI/RFI effecting performance on your n etwork? Running cable along power lines Answer:Using STP cable Using fluorescent lighting Use generators to power switches in MDF 12. What is the reason magnetic tape is used to backup data? Speed Easily locate data Answer:Cost Tape never needs replacing 13. Which of the following is a program that spreads across computers and usuall y reproduces copies of itself in a computer's memory? CRC error SAP updates Answer:Worm BDU's 14. Which of the following is NOT used as a baseline measure? Bandwidth utilization Collision count Broadcast traffic Answer:Configuration errors 15. Network troubleshooting is defined as what type of process? An applied science Answer:A systematic process A skill An applied theory

16. Which of the following is a program that usually has a negative effect on ex ecutable programs? Trojan Horse Answer:Virus Worm Infection 17. What criteria should be used to select network passwords? Specific family names Birth dates Mother's maiden name Answer:Network policy 18. What controls the resources and management of a client-server network? Server Answer:Network operating system (NOS) Host Client

19. Which of the following is included in MDF and IDF documentation? POP specifications Answer:Rack mount locations Name of administrator Server cost 20. Which of the following refers to documentation that outlines what is and wha t is not permissible on the network? Answer:User policies Internet guidelines Group restrictions Workstation permissions 21. Risks associated with working on the inside of a computer can be reduced by doing which of the following? Answer:Using a grounding strap Standing on synthetic carpet Turning the power on Wearing leather shoes 22. What is the recommended maximum number of users in a peer-to-peer network? 5 Answer:10 15 20 Mixed Final Exam of the book 3 1. How is communication provided between VLANs? Application protocols Layer 2 routing Layer 2 switching Answer:Layer 3 routing 2. The star/extended star topology uses which standard? Token ring Answer:Ethernet 802.3 Ethernet 802.5 ARCNET 3. Which configuration command is used to set the number of routes used for load sharing? ipx routing ipx networks Answer:ipx maximum-paths router rip 4. Which type of back up operation backs up all files on the disk and sets the a rchive bit on all files to off? Daily backup Differential backup Answer:Full backup Incremental backup 5. What happens to a packet that does not match any of the tests in an access li

st? Answer:It is discarded. It is sent to the recipient. It is stored until the access list is updated. It is returned to the sender. 6. A wildcard mask bit of "0" means that the corresponding bit must be _________ . Answer:matched ignored deleted passed 7. Select the correct pairing of a Spanning Tree Protocol state with its functio nal description: Blocking - no frames forwarded, learning addresses Forwarding - no frames forwarded, BPDUs heard Learning - no frames forwarded, no BPDUs heard Answer:Listening - no frames forwarded, listening for frames 8. Which routing protocol maintains a complex database of topology information a nd uses link-state advertisements (LSAs)? RIP IGRP Answer:OSPF EIGRP 9. How can a router learn a path to a destination? ARP tables DNS entries Answer:Dynamic routing Temporary routing 10. In an access list, which word can replace 0.0.0.0 255.255.255.255? Permit Accept Answer:Any All 11. What is used by distance-vector routing protocols? A topological database Link-state advertisements Answer:Periodic updates of entire routing table Shortest path first algorithms 12. What do routers use to forward packets between source and destination networ ks? ARP cache CAM table Host name table Answer:Routing table

13. What do routers use to maintain tables? Broadcast forwarding IP Tunneling Routed protocols Answer:Routing protocols 14. Which statements are true when configuring a router to operate with RIP? At the global configuration prompt issue the command "router rip." Then set up t he IP address and subnet mask on each interface. Answer:At the global configuration prompt issue the command "router rip." Then i ssue the "network" command at the config router prompt for each directly connect ed network. At the global configuration prompt issue the command "rip." Then use the "networ k" command to indicate which network(s) to advertise. At the global configuration prompt issue the command "enable rip routing." Then set up the IP address and subnet mask on each interface. 15. Select the prompt which will be displayed after issuing the router igrp 100 command. RouterAnswer: Answer:Router(config)Answer: Router(config-igrp)Answer: Router(config-router)Answer: 16. Switches that receive the entire frame before sending it, use which type of frame forwarding? Cut-through Receive and send Copy and send Answer:Store-and-forward 17. Which frame type is the default for Novell version 2 through 3.11? Ethernet_802.2 Answer:Ethernet_802.3 Ethernet_II Ethernet_SNAP 18. Which type of ACL only checks the source address? Extended ACL General ACL Source ACL Answer:Standard ACL 19. Which of the following imposes boundaries on broadcast traffic? Bridge Repeater Answer:Router Transceiver 20. Which IPX routing command is used to show the number and type of packets rec eived and transmitted by the router? show ipx servers show ipx route

Answer:show ipx traffic show ipx interface 21. What allows a router to accept a packet on one interface and forward it to a nother interface? Broadcast forwarding Answer:Switching function Filter and control function Path determination 22. All of the following statements about VLANs are true EXCEPT: They are logical groupings of devices. Users can be grouped by function. VLANs are configured by software. Answer:VLANs are standardized. 23. Which of the following devices establishes a bandwidth domain also known as the collision domain? Repeater Answer:Switch Active hub Passive hub 24. At which layers of the OSI model do VLANs operate? Application and Presentation Answer:Data Link and Network Physical and Transport Physical and Data Link 25. Where should ACLs be applied if they are intended to provide security for th e network? Answer:On border routers On external routers On internal routers On output routers 26. In which type of VLAN are all of the nodes connected to ports in the same VL AN assigned the same VLAN ID? Default Dynamic Answer:Port centric Static 27. How is a frame tagged on a VLAN? With an application ID With a MAC address With a port ID Answer:With a VLAN ID 28. What is another term for latency? Backoff algorithm Hold-down timer

Answer:Propagation delay Redundancy 29. What does the split horizon rule help prevent? Static routes Answer:Routing loops Dynamic routes Large ARP tables 30. Before a router forwards a packet, which address does it change? Destination IP address Answer:Destination MAC address Next-hop IP address Source IP address 31. What is a benefit of using VLANs? Extended collision domains Increased administration Multiple cable runs Answer:Tighter network security 32. A switch segments a LAN into which of the following? Answer:Microsegments Workgroups Broadcast domains Access groups 33. Twenty users are evenly connected to two hubs, which are each connected to 1 0 Mbps switch ports. What is the average bandwidth available per user? 0.5 Mbps Answer:1 Mbps 2 Mbps 10 Mbps 34. Which of the following is the correct command to delete an access list? Router(config)# delete access list list-number Answer:Router(config)# no access-list list-number Router(config-if)# delete access-list list-number Router(config-if)# no access list list-number 35. Which of the following is true regarding routing metrics? All routing protocols use the same metrics. IGRP uses bandwidth as its only metric. Answer:Routers compare metrics to determine the best route. The larger metric generally represents the better path. 36. What is the recommended maximum number of users in a peer-to-peer network? 5 Answer:10 15 20

37. Which protocol is used to allow redundant paths in a switched/bridged networ k? RIP Answer:Spanning Tree IGRP ISL 38. What is the effect of a switch on bandwidth? Answer:Dedicates bandwidth Shares bandwidth Decreases bandwidth Eliminates bandwidth 39. What is the encapsulation type on a router for a Novell network running vers ion 3.12? Novell-ether ARPA SNAP Answer:SAP 40. Identify the correct pairing of a protocol and its classification. BGP-Interior IGRP-Exterior OSPF-Exterior Answer:RIP-Interior 41. Which of the following is a true statement regarding location of servers in a network? Enterprise and workgroup servers should both be in the IDF. Enterprise and workgroup servers should both be in the MDF. Answer:Workgroup servers should be in the appropriate IDF, while enterprise serv ers should be in the MDF. Workgroup servers should be in the appropriate MDF, while enterprise servers sho uld be in the IDF. 42. Which device is one of the most common Layer 2 devices? Answer:LAN switch Active hub Passive hub Router 43. Which of the following RAID levels includes disk mirroring or disk duplexing ? RAID 0 Answer:RAID 1 RAID 3 RAID 5 44. Select the correct pairing of a network service with the class of server on which it is most likely to reside: Answer:DNS - enterprise E-mail - workgroup File sharing - enterprise

Word processing - enterprise 45. Which of the following devices allows communication between VLANs to occur? bridge hub switch Answer:router 46. Which of the following will help alleviate congestion? The installation of more hubs The use of an extended star topology The use of bus topology Answer:An increase in bandwidth 47. Which condition best describes convergence? When messages simultaneously reach a router and a collision occurs When several routers simultaneously route packets along the same path Answer:When all routers in an internetwork have the same knowledge of the struct ure and topology of the internetwork When several messages are being sent to the same destination 48. Entries made by an administrator to manipulate a routing table are referred to as which of the following? Answer:Static routes Dynamic routes ARP tables Routing tables 49. What does a bridge use to build its address table? Destination IP address Destination MAC address Source IP address Answer:Source MAC address 50. Which of the following is true regarding latency? CSMA/CD requires no latency. It is also called asymmetry. It is based entirely on distance. Answer:Networking devices add to latency. 51. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps wo uld require which of the following? Answer:A faster switch port A new HCC port Additional VCC uplink connections Use of fiber-optic media 52. Which routing protocol is used to communicate between autonomous systems? RIP Ethernet Token Ring Answer:Exterior routing protocol

53. Where should extended access lists be placed? Answer:Close to the source Close to the destination On any router in the network Midway between source and destination 54. Which command verifies that a particular node is capable of responding to an IPX network request? Connect Debug Answer:Ping Show Which of the following are true regarding router interfaces?(Choose three.) Answer : connect the router to the network for packet entry and exit. can be on the motherboard or a separate module. connect the router to LANs and WANs. 2. Which router component holds the configuration file when power is lost? Answer: non-volatile random access memory. 3. During the initial configuration of a 2600 series Cisco router, which cable i s required for connecting a PC to the console port? Answer: rollover. 4. What contains the instructions that a router uses to control the flow of traf fic through its interfaces? Answer: configuration files. 5. A router is composed of many internal components. Which of the following comp onents stores a copy of the router s configuration file? Answer: non-volatile random access memory. 6. Terminal emulation software, such as HyperTerminal, can be used to configure a router. Which of the following HyperTerminal options shown in the graphic are correctly set to allow configuration of a Cisco router? (Choose three.) Answer: data bits. parity. stop bits. 7. Which of the following layers of the OSI model are incorporated in WAN standa rds? (Choose two.) Answer: physical layer. data link layer. 8. Which of the following describes the function of a WAN? Answer: provides connectivity over a large geographic area. 9. What do routers use to select the best path for outgoing data packets? Answer:routing tables. 10. Which basic components do a router and a standard desktop PC have in common? (Choose three.) Answer: CPU. input/output interfaces. system bus. 11. Several Ethernet hosts on a LAN need the gateway services of a Cisco 2500 se ries router. Which of the following would be needed to physically connect a rout er to all of the hosts on the LAN? (Choose two.) Answer: straight-through cables between a switch and hosts on a LAN. a straightthrough cable between the transceiver on a router and a switch. 12. Which of the following descriptions are true regarding the management connec tions on a Cisco router? (Choose three.) Answer: They are non-network connections. They are used for initial router confi guration. They are asynchronous serial ports. 13. Why is a console connection to a router or switch preferred when troubleshoo ting? (Choose two.) Answer: does not depend on network services. displays startup and error messages by default. 14. Which of the following are functions of NVRAM? (Choose two.) Answer: retains contents when power is removed. stores the startup configuration file.

15. An internetwork must include which of the following? (Choose three.) Answer: switching. dynamic or static routing. consistent end-to-end addressing. 16. Which of the following are functions of RAM? (Choose three.) Answer: stores routing table. holds fast switching cache. stores running configu ration file. 17. A router is composed of many internal components. Which of the following com ponents stores a copy of the router s configuration file? Answer: non-volatile random access memory. 18. Which of the following devices are used in the construction of a WAN? (Choos e three.) Answer: routers. communication servers. modems. 19. ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the rou ter for the initial configuration? (Choose three.) Answer: terminal emulation software. rollover cable. RJ-45 to DB-9 connector. 20. Select the statements that correctly describe flash memory in a 2600 series router? (Choose two.) Answer: can be upgraded with single in-line memory modules. stores Cisco IOS sof tware images. 21. Which of the following tasks can be accomplished through a management connec tion on a router? (Choose three.) Answer: troubleshooting problems. monitoring the system. configuring the router. 1.Refer to the exhibit. What type of network is shown? Answer: LAN 2.Refer to the exhibit. Which networking term describes the data interleaving pr ocess represented in the graphic? Answer:multiplexing 3.Refer to the exhibit. Which term correctly identifies the device type that is included in the area B? Answer:intermediary 4. Select the statements that are correct concerning network protocols. (Choose three.) Answer:define the structure of layer specific PDU's. outline the functions neces sary for communications between layers. require layer dependent encapsulations 5. Which characteristic correctly refers to end devices in a network? Answer:originate data flow 6. What is the primary purpose of Layer 4 port assignment? Answer:to identify the processes or services that are communicating within the e nd devices 7. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.) Answer:Physical . Data Link 8. What device is considered an intermediary device? Answer:switch 9. What is a PDU? Answer:a layer specific encapsulation 10. During the encapsulation process, what occurs at the data link layer? Answer:The physical address is added. 11. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)Answer:determine pathways for data . retime and retransm it data signals . manage data flows 12.Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.) LAN Answer:Network B WAN Network C LAN Network A 13. What are two functions of encapsulation? (Choose two.) Answer:identifies pieces of data as part of the same communication . ensures tha t data pieces can be directed to the correct receiving end device 14. What is the purpose of the TCP/IP Network Access layer? Answer:network media control

15.Refer to the exhibit. Which set of devices contains only end devices? Answer:E, F, H, I, J 16. What can be identified by examining the network layer header? Answer:the destination host address 17. What is a primary function of the trailer information added by the data link layer encapsulation? Answer:supports error detection 18. Which layer encapsulates the segment into packets? Answer:network 19.Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP sess ion with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which de vice type best describes the function of wireless device Cell A? Answer:an end device 20. What is the proper order of the layers of the OSI model from the highest lay er to the lowest layer? Answer:application, presentation, session, transport, network, data link, physic al 21. Which three statements best describe a Local Area Network (LAN)? (Choose thr ee.) Answer:A LAN is usually in a single geographical area. The network is administer ed by a single organization. A LAN provides network services and access to appli cations for users within a common organization. 1. Refer to the exhibit. Branch A has a non-Cisco router that is using IETF enca psulation and Branch B has a Cisco router. After the commands that are shown are entered, R1 and R2 fail to establish the PVC. The R2 LMI is Cisco, and the R1 L MI is ANSI. The LMI is successfully established at both locations. Why is the PV C failing?Answer: The IETF parameter is missing from the frame-relay map ip 10.1 0.10.1 201 command. 2. Refer to the exhibit. Communication between two peers has failed. Based on th e output that is shown, what is the most likely cause? Answer: PPP negotiation failure 3.A technician is talking to a colleague at a rival company and comparing DSL tr ansfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the exp lanation for why company 1 reports higher download speeds than company 2 reports ? Answer: Company 2 is located farther from the service provider than company 1 is . 4. Refer to the exhibit. A network administrator is creating a prototype to veri fy the new WAN design. However, the communication between the two routers cannot be established. Based on the output of the commands, what can be done to solve the problem? Answer: Configure RA with a clock rate command. 5.Refer to the exhibit. Router RT is not receiving routing updates from router R TA. What is causing the problem? Answer: The passive-interface command was issued for RTA. 6. What are two main components of data confidentiality? (Choose two.) Answer: encapsulation . encryption 7. Which network component has the primary function of detecting and logging att acks made against the network?Answer: intrusion detection system 8.Refer to the exhibit. A network technician has been called in to resolve a pro blem with this network segment. The symptoms include a loss of connectivity thro ughout the network segment, high link utilization, and syslog messages that indi cate constant MAC address relearning. What is the likely cause of these symptoms ? Answer: spanning tree problem 9. Which variable is permitted or denied by a standard access control list? Answer: source IP address 10.Refer to the exhibit. To reach R2, and for configuring Frame Relay on the poi nt-to-point interfaces shown in the graphic, which DLCI should be used in the fr

ame-relay interface-dlci command that is issued on R1? Answer: 100 11. A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remot e office. How can the system administrator configure the router to provide Inter net access to all ten users at the same time? Answer: Configure dynamic NAT for ten users. 12.Refer to the exhibit. Which two actions are described by the output of the de bug ip nat command? (Choose two.) Answer: The * indicates that the NAT translation was unsuccessful and the packet was dropped. A packet from 192.31.7.2 has been sent to 198.133.219.2, which was then translated to the destination 192.168.1.2 13. Refer to the exhibit. A technician issues the show interface s0/0/0 command on R1 while troubleshooting a network problem. What two conclusions can be deter mined by from the output shown? (Choose two.) Answer: The bandwidth has been set to the value of a T1 line. There is no failur e indicated in an OSI Layer 1 or Layer 2. 14.Which Layer 2 access method separates traffic into time slots and is specifie d by DOCSIS for use with cable high speed Internet service? Answer: TDMA 15.Refer to the exhibit. Which data transmission technology is being represented ? Answer: TDM 16.Which statement is true about PAP in the authentication of a PPP session? Answer: PAP uses a two-way handshake. 17.What is a common use of a TFTP server? Answer: to perform IOS image and configuration uploads and downloads over the ne twork 19.What is the result when the command security passwords min-length 8 is entere d into a router? Answer: All new passwords are required to be a minimum of 8 characters in length . 20. After troubleshooting a LAN, a network technician has determined that networ k performance has been severely impacted by the attenuation of the bit stream. W hich physical layer condition led the technician to this conclusion? Answer : There is an open conductor between the endpoints on the physical media. 21. A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide c ompared to a shared Frame Relay solution? (Choose two.) Answer : reduced jitterreduced latency 22.Which two statements are true about creating and applying access lists? (Choo se two.) Answer : One access list per port, per protocol, per direction is permitted. Sta tements are processed sequentially from top to bottom until a match is found. 23. A network technician wants to implement SSH as the means by which a router m ay be managed remotely. What are two procedures that the technician should use t o successfully complete this task? (Choose two.) Answer : Define the asymmetrical keys. Enter the service password-encryption com mand. 24.Which two protocols in combination should be used to establish a link with se cure authentication between a Cisco and a non-Cisco router? (Choose two.) Answer : PPP PAP 25. What will be the result of adding the command ip dhcp excluded-address 192.1 68.24.1 192.168.24.5 to the configuration of a local router that has been config ured as a DHCP server? Answer: The DHCP server will not issue the addresses ranging from 192.168.24.1 t o 192.168.24.5. 26. Refer to the exhibit. The network administrator creates a standard access co ntrol list to prohibit traffic from the 192.168.1.0/24 network from reaching the Internet. The access list must still permit the 192.168.1.0/24 network access t

o the 192.168.2.0 network. On which router interface and in which direction shou ld the access control list be applied? Answer: interface S0/0/0, outbound 29.An administrator attempts to telnet into a remote device and receives the err or Password required but none set . How can the administrator resolve this issue? Answer: Set the enable secret command on the remote router. 31. Which additional functionality is available on an interface when the encapsu lation is changed from HDLC to PPP? Answer: authentication 34. A network administrator uses the 3DES algorithm to encrypt traffic that cros ses a VPN. Which VPN characteristic is being configured? Answer: data integrity 35. Which statement is true about wildcard masks? Answer: A wildcard mask of 0.0.0.0 means the address should match exactly. 37. When NAT is in use, what is used to determine the addresses that can be tran slated on a Cisco router? Answer: access control list 38.A network administrator is instructing a technician on best practices for app lying ACLs. Which suggestion should the administrator provide? Answer: Extended ACLs should be applied closest to the source that is specified by the ACL. 39. Which IP address and wildcard mask combination can be used in an ACL stateme nt to match the 172.16.0.0/30 network? Answer: 172.16.0.0 0.0.0.3 40.When configuring a Frame Relay connection, what is the purpose of Inverse ARP ? Answer: to create a mapping of DLCI to Layer 3 addresses that belong to remote p eers 41. Which security solution has the responsibility of monitoring suspicious proc esses that are running on a host and that might indicate infection of Trojan hor se applications? Answer: antivirus application 42. What is the function of an intrusion detection system on a network? Answer: to detect attacks against a network and send logs to a management consol e 43. Which statement about a VPN is true? Answer: VPNs use virtual Layer 3 connections that are routed through the Interne t. 44. An administrator learns of an e-mail that has been received by a number of u sers in the company. This e-mail appears to come from the office of the administ rator. The e-mail asks the users to confirm their account and password informati on. Which type of security threat does this e-mail represent?Answer: phishing 45. Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the network administrator issues the commands as shown in the ex hibit? Answer: The commands are added to the end of the existing ACL. 46. Which encapsulation protocol when deployed on a Cisco router over a serial i nterface is only compatible with another Cisco router? Answer: HDLC 47.What name is given to the location where a customer network interfaces with a network that is owned by another organization? Answer: demarcation point 50.A network administrator has changed the VLAN configurations on his network sw itches over the past weekend. How can the administrator determine if the additio ns and changes improved performance and availability on the company intranet? Answer: Conduct a performance test and compare with the baseline that was establ ished previously. 51.Which characteristic of VPN technology prevents the contents of data communic ations from being read by unauthorized parties? Answer: confidentiality

1. Why was the OSI model developed? Answer:Standards were needed to allow any two systems to communicate. 2. The physical layer is concerned with the movement of _______ over a physical medium. Answer:bits 3. Which OSI model functions as a link between user support layers and network s upport layers? Answer:Transport 4. Routers function within which layer(s)? Answer:Physical,Data Link,Network 6. A multicast message is sent from _____ to _____? Answer:One source; multiple destinations 5. An IP header size = ? Answer:20 - 60 bytes long 7. Connection establishment in TCP is referred to as? Answer:Two-way handshaking 8. which layer exists between the Presentation and Transport layers? Answer:Session 9. In networking, what does ATM stand for? Answer:Asynchronous Transfer Mode 10. Which type of encoding was named after a city in England? Answer:Manchester 11. Which is USUALLY larger: WAN, LAN or MAN? Answer:WAN 12. What San Jose based company is currently considered to be the king of networ ks? Answer:Cisco 13. What does the 802 in the various network standards stand for? Answer:February 1980 14. Which of the following is not a network topology? Answer:Serial 15. What is the correct way to end an HTML page? Answer:</HTML> Q.1. what are the different types of delay associated with packet switched netwo rks? Answer: Processing, Transmission, Queuing, Propogation delays. Q.10.For client-server type request reply queries TCP/UDP/HTTP is the protocol t hat is widely used. Answer:b) Datagram networks: Answer Q.12 Arrange the following protocol layers from top to bottom. Answer: Application->Transport->Network->Link->Physical Q.14 Which feature is not offered by TCP? Answer:c) Constant bit rate: Answer Q.15 Which of the following is a list of TCP service features? Answer:b) Reliable, connection oriented, flow control: Answer Q.16 which of the following is a list of packet switching characteristics? Answer:b) Bandwidth shared, queues at routers, different paths possible: Answer Q.17 Data transfer between two neighboring routers involves only Answer:c) Physical layer, link layer, network layer: Answer Q.18 When compared to transmission delay, propagation delay is always Answer:c) No restrictions-may be greater or smaller: Answer Q.19.which of these is true? Answer:d) In a layered structure underlying protocols can be changed: Answer 1. DNS is an ___Application_____layer protocol. Answer:c) Application 2. The __Authoratative _ nameserver certainly has the IP address of a host. Answer:d)Authoritative. 6. If one were to describe the mapping between IP addresses and hostnames, this mapping would be Answer:d) manymany

8. Suppose you use HTTP with nonpersistent connections, and send a request for a file containing three images. Estimate the time required to get the whole page in terms of round trip times. (Starting from clicking on the URL. Ignore transmission times, assume images and f iles are very small). Answer: ___8_ RTTs 9. Do the above, assuming persistent connections without pipelining. Answer: __5__ RTTs 10.Do the above, assuming persistent connections with pipelining. Answer: ___3_ RTTs 11.The default mode of HTTP 1.1 is Answer:b)Persistent connection with pipelining 1. The network layer is implemented in Answer:c. Hosts and routers 2. The functions of the network layer are Answer:b. Determining routes 3. A routing protocol is run in a datagram network Answer:b. When a link cost changes & c. Periodically The size of the routing table in router in a datagram network with N routers and E links is 4. Answer:a. O(N) Peer to Peer networks are usually more complex and expensives to set up. Answer:false What is Computer Networking? Answer:Is the communication between computer system or devices. / Computers conn ected to each other with the ability to share information In the Internet Jargon, devices such as PDA's, portables computers, cell phones, capable to connect to the Internet are called Answer:Hosts or Hosts are sometimes divided into two categories: clients and servers Answer:True Is the computer on the network that requests resources or services from another computer on a network. Answer:client How many layers are in the OSI (Open Systems Interconnection) Model? Answer:7 What is the default port number for FTP server? Answer:21,22 Is the physical layout of a computer network Answer:Topology,topology A type of network that connects two or more LAN's or MAN's is called Answer:Wide Area Network Type of network in which computers can communicate directly to each other. Answer:peer to peer Chapter 2 Correct Answers: 1. What are the key functions of encapsulation? (Choose three.) Answer: identifies pieces of data as part of the same communication , ensures th at data pieces can be directed to the correct receiving end device, enables the reassembly of complete messages 2. What is a primary function of the trailer information added by the data link layer encapsulation? Answer: supports error detection 3. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.) Answer: Physical , Data Link

4. Which three statements best describe a Local Area Network (LAN)? (Choose thre e.) Answer: A LAN is usually in a single geographical area. , The network is adminis tered by a single organization. , A LAN provides network services and access to applications for users within a common organization. 5. Refer to the exhibit. Which networking term describes the data interleaving p rocess represented in the graphic? Answer: multiplexing 6. What is the primary purpose of Layer 4 port assignment? Answer: to identify the processes or services that are communicating within the end devices 7. What can be identified by examining the network layer header? Answer: the destination host address 8. What is the purpose of the TCP/IP Network Access layer? Answer: detailing the components that make up the physical link and how to acces s it 9. Which layer encapsulates the segment into packets? Answer: network 10. Select the statements that are correct concerning network protocols. (Choose three.) Answer: define the structure of layer specific PDU's, outline the functions nece ssary for communications between layers, require layer dependent encapsulations 11. What is a PDU? Answer: a layer specific encapsulation 12. Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, w hich device type best describes the function of wireless device "Cell A?" Answer: an end device 13. Refer to the exhibit. Which term correctly identifies the device type that i s included in the area B? Answer: intermediary 14. What device is considered an intermediary device? Answer: switch 15. Which characteristic correctly refers to end devices in a network? Answer: originate data flow 16. Refer to the exhibit. Which set of devices contains only end devices? Answer: E, F, H, I, J 17. During the encapsulation process, what occurs at the data link layer? Answer: The physical address is added. 18. Refer to the exhibit. Which three labels correctly identify the network type s for the network segments that are shown? (Choose three.) Answer: Network B -- WAN, Network C -- LAN, Network A -- LAN 19. What is the proper order of the layers of the OSI model from the highest lay er to the lowest layer? Answer: application, presentation, session, transport, network, data link, physi

cal 20. Which statements correctly identify the role of intermediary devices in the network? (Choose three.) Answer: determine pathways for data, retime and retransmit data signals, manage data flows 21. Refer to the exhibit. What type of network is shown? Answer: LAN In your opinion (this has no bearing on your grade), please indicate your intere st in this course: Answer: (3) Interested In your opinion (this has no bearing on your grade), please indicate how enthusi astic you are about the content of this course and the things you re learning (or have learned): Answer: (3) Enthusiastic In your opinion (this has no bearing on your grade), please rate your motivation to do well in this course: Answer: (4) Very Motivated Chapter 3 22. What are two forms of application layer software? (Choose two.) Answer: applications, services 23. What is the purpose of resource records in DNS? Answer: used by the server to resolve names 24. What three protocols operate at the Application layer of the OSI model? (Cho ose three.) Answer: DNS, SMTP, POP 25. Which application layer protocols correctly match a corresponding function? (Choose two.) Answer: HTTP transfers data from a web server to a client, Telnet provides a vir tual connection for remote access 26. As compared to SSH, what is the primary disadvantage of telnet? does not support encryption 27. What are three properties of peer-to-peer applications? (Choose three.) Answer: acts as both a client and server within the same communication, hybrid m ode includes a centralized directory of files, can be used in client-server netw orks 28. Which email components are used to forward mail between servers? (Choose two .) Answer: MTA, SMTP 29. What application layer protocol describes the services that are used for fil e sharing in Microsoft networks? SMB 30. Which statements are correct concerning the role of the MTA in handling emai l? (Choose three.) Answer: receives email from the client's MUA, passes email to the MDA for final delivery, uses SMTP to route email between servers

31. How does the application layer on a server usually process multiple client r equest for services? Answer: uses support from lower layer functions to distinguish between connectio ns to the service 32. Which layer of the OSI model supplies services that allow user to interface with the network? Answer: application 33. What is the automated service that matches resource names with the required IP address? Answer: DNS 34. Refer to the exhibit. What is the destination port for the communication tha t is represented on line 5? Answer: 80 35. What are two characteristics of peer-to-peer networks? (Choose two.) Answer: decentralized resources, resource sharing without a dedicated server 36. A network administrator is designing a network for a new branch office of tw enty-five users. What are the advantages of using a client-server model? (Choose two.) Answer: centralized administration, security is easier to enforce 37. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) Answer: HTTP, HTTPS 38. What is the role of the OSI application layer? Answer: provides the interface between the applications on either end of the net work 39. A small home network has been installed to interconnect three computers toge ther for gaming and file sharing. What two properties represent this network typ e? (Choose two.) Answer: Security is difficult to enforce., A computer that responds to a file sh aring request is functioning as a server. 40. What application layer protocol is commonly used to support for file transfe rs between a client and a server? Answer: FTP 41. What are two characteristics of clients in data networks? (Choose two.) Answer: initiate data exchanges, may upload data to servers Chapter 4 42. Based on the transport layer header shown in the diagram, which of the follo wing statements describe the established session? (Choose two.) Answer: This contains a Telnet request., This is a TCP header. 43. With TCP/IP data encapsulation, which range of port numbers identifies all w ell-known applications? 0 to 255 256 to 1022 Answer: 0 to 1023 1024 to 2047 49153 to 65535 44. Why are port numbers included in the TCP header of a segment?

to indicate the correct router interface that should be used to forward a segmen t to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data Answer: to enable a receiving host to forward the data to the appropriate applic ation to allow the receiving host to assemble the packet in the proper order 45. Which two options represent Layer 4 addressing? (Choose two.) Answer: identifies the communicating applications, identifies multiple conversat ions between the hosts 46. Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operatio n is being performed? Answer: session establishment 47. Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) Answer: The local host is using three client sessions., The local host is using web sessions to a remote server. 48. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments Answer: source and destination port 49. Which three features allow TCP to reliably and accurately track the transmis sion of data from source to destination? Answer: flow control, session establishment, numbering and sequencing 50. Which is an important characteristic of UDP? acknowledgement of data delivery Answer: minimal delays in data delivery high reliability of data delivery same order data delivery 51. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the res ponse from the server? 13 53 Answer: 80 1024 1728 52. Which event occurs during the transport layer three-way handshake? The two applications exchange data. Answer: TCP initializes the sequence numbers for the sessions. UDP establishes the maximum number of bytes to be sent. The server acknowledges the bytes of data received from the client. 53. Why is flow control used for TCP data transfer? to synchronize equipment speed for sent data to synchronize and order sequence numbers so data is sent in complete numerical order Answer: to prevent the receiver from being overwhelmed by incoming data to synchronize window size on the server to simplify data transfer to multiple hosts

54. Which transport layer protocol provides low overhead and would be used for a pplications which do not require reliable data delivery? TCP IP Answer: UDP HTTP DNS 55. During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message? The packets will not be delivered. The packets will be retransmitted from the source. Answer: The packets will be delivered and reassembled at the destination. The packets will be delivered and not reassembled at the destination. 56. What mechanism is used by TCP to provide flow control as segments travel fro m source to destination? sequence numbers session establishment Answer: window size acknowledgments 57. Refer to the exhibit. Host A is using FTP to download a large file from Serv er 1. During the download process, Server 1 does not receive an acknowledgment f rom Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal Answer: reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the host change the window size in the Layer 4 header 58. What is dynamically selected by the source host when forwarding data? destination logical address source physical address default gateway address Answer: source port 59. Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? application presentation session Answer: transport network 60. Refer to the exhibit. Host1 is in the process of setting up a TCP session wi th Host2. Host1 has sent a SYN message to begin session establishment. What happ ens next? Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2. Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2. Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2. Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1. Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1. Answer: Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1. 61. What are two features of the User Datagram Protocol (UDP)? (Choose two.) Answer: low overhead, connectionless 330. Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame r eceived at PC2 is shown. What information in this determines the correct destina

tion application? Answers: destination and source process numbers 331. Refer to the exhibit. Host A is accessing multiple servers. Which combinati on of port number and address will uniquely identify particular process running on a specific server? Answers: MAC address of the server and port number of the service 332. Refer to the exhibit. Which logical topology describes the exhibited networ k? Answers: point-to-point 333. Refer to the exhibit. Host A wants to access the Internet. Which combinatio n of a Layer 2 address and a Layer 3 address will enable this access from host A ? Answers: Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130 334. Refer to the exhibit. The PC, the routing table of which is displayed, is c onfigured correctly. To which network interface does the IP address 192.168.1.15 4 belong? Answers: router interface fa0/1 335. Refer to the exhibit. Which list refers only to end devices? Answers: D,E,F,G 336. Refer to the exhibit. PC1 is unable to access PC2. To trouble shoot this pr oblem, the technician needs to confirm that the next hop interface is operationa l. Which default gateway address should the technician ping from PC1 to confirm this? Answers: 10.0.0.254 337. A network technician wants to configure an IP address on a router interface by using the ip address 192.168.1.0 255.255.255.0 command. Which prompt should the technician see when entering this command? Answers: Router(config-if)# 338. What is the effect of using the Router# copy running-config startup-config command on a router? Answers: The contents of NVRAM will change. 339. The network administrator wants to install a private application on a serve r. Which range of port numbers is normally assigned to this application to make it accessible by clients? Answers: 0 to 1023 340. Refer to the exhibit. In a network, host A is sending data segments to host B. The flow control of the segments that are being exchanged is displayed. Whic h two statements are true about this communication? (Choose two.) Answers: The initial window size is determined via the two-way handshake, Acknow ledgment number 3001 indicates that host A will send the next segment with seque nce number 3001. 341: Which statement is true about the running configuration file in a Cisco IOS device? Answers: It affects the operation of the device immediately when modified. 342. Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.) Answers: A single broadcast domain is present, Three collision domains are prese nt. 343. Refer to the exhibit. All devices in the network use default configurations . How many logical address ranges are required in this topology? Answers: 5 logical topologies 344. Refer to the exhibit. A technician has connected the PC to the switch using a Category 6 UTP cable. Which two statements are true about this connection? (C hoose two.) Answers: The maximum distance between the switch and the PC can be 100 m., The m aximum supported bandwidth is 1000 Mb/s. 345. Refer to the exhibit. To create the initial configuration, a network techni

cian connected host A to the router using the connection that is shown. Which st atement is true about this connection? Answers: It provides out-of-band console access. 346. Refer to the exhibit. Host X is unable to communicate with host Y. Which co mmand can be run at host X to determine which intermediary device is responsible for this failure? Answers: tracert 192.168.1.1 347. Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch? Answers: The switch will remove the MAC address at Fa0/19. Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Interne t. Which IP address should be changed to 209.165.201.1 to enable the PC to acces s the Internet? Answers: 192.168.1.254 348. Refer to the exhibit. The serial interface of the router was configured wit h the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network techni cian do to solve this problem? Answers: Configure an IP address on interface serial 0/0/0. Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data? application layer presentation layer session layer Answers: transport layer Refer to the exhibit. Host B attempts to establish a TCP/IP session with During this attempt, a frame was captured at the FastEthernet interface f the San Francisco router. The packet inside the captured frame has the IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What destination MAC address of the frame at the time of capture? 0060.7320.D632 0060.7320.D631 Answers: 0040.8517.44C3 0009.B2E4.EE03 0010.C2B4.3421 host C. fa0/1 o source is the

Refer to the exhibit. All devices in the network use default configurations. How many logical address ranges are required in this topology? Answers: 5 logical topologies 223. Frame Relay is configured over a point-to-point connection between two rout ers. The output of the show frame-relay pvc command indicates that the status of this PVC is inactive. Which of the following device s could be the source of the problem? (Choose two.) ?local router ?local Frame Relay switch Answer: remote router Answer: remote Frame Relay switch ?R3 has the following configuration: ?R3# show running-config ?--some output text omitted-?interface serial0/0

?bandwidth 128 ?ip address 192.168.11.2 255.255.255.0 ?encapsulation frame-relay ?frame-relay map ip 192.168.11.2 30 broadcast 224. After the command R3# debug frame-relay packet is executed, a ping is issue d from R3 to R1 but is unsuccessful. Based on the output of the debug command sh own in the graphic and the router configuration, what might be problem? Answer: No clock rate assigned. ?There is an incorrect DLCI number in the map statement. ?An incorrect IP address exists in the map statement. ?The encapsulation command is missing the broadcast keyword 225. Which statements are true regarding the Frame Relay LMI? (Choose three.) Answer: The LMI provides a virtual circuit onfigured on the router must match the one I uses reserved DLCIs to exchange messages 226. Which statement describes the process ation (NAT) overloading? (VC) status used on the between the that occurs mechanism, The LMI type c Frame Relay switt, The LM DTE and DCE in Network Address Transl

Answer: Multiple private IP addresses are mapped to one public IP address. ?The number of usable addresses assigned to a company is divided into smaller ma nageable groups. ?A pool of IP addresses are mapped to one or more MAC addresses. ?The router acts as a DHCP server and assigns multiple public IP addresses for e ach private IP address configured 227. Which two statements are true about the committed information rate on a Fra me Relay link? (Choose two.) ?The sum of the CIRs for all PVCs must be less than the port speed. ?The sum of the CIRs for all PVCs must equal the port speed. Answer: The sum of the CIRs for all PVCs can be greater than the port speed., Th e DE bit will be set on frames that are transmitted in excess of the CIR. ?Frames that are transmitted at greater than the CIR will be discarded at the so urce. ?It is impossible to transmit frames at a rate in excess of the CIR 228. Which of the following commands would be used to troubleshoot the processin g of call control functions such as call setup, signaling, and termination? ?show interface bri0/0 ?show isdn active ?debug isdn q921 Answer: debug isdn q931 ?debug ppp negotiation ?debug ppp authentication 229. Which of the following statements are true regarding PPP? (Choose three.) Answer: PPP can use synchronous and asynchronous physical media, PPP uses LCPs t o establish, configure, and test the data link connection., PPP uses LCPs to agr ee on format options such as authentication, compression, and error detection 230. A network administrator is evaluating authentication protocols for a PPP li nk. Which of the following reasons might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.) ?establishes identities with a two-way handshake Answer: uses a three-way authentication periodically during the session to recon firm identities, transmits login information in encrypted format, uses an unpred ictable variable challenge value to prevent playback attacks ?makes authorized network administrator intervention a requirement to establish each session 231. Why are static routes often used with ISDN DDR? ?They are more stable than dynamic routing protocols.

50 ?They are more accurate than dynamic routing protocols because they are put in b y a network administrator. ?They are easier to modify when a faster technology is installed. Answer: They prevent the unnecessary activation of the link 232. Assuming that four bits have been borrowed to make subnets, identify the su bnet network addresses. (Choose three.) ?192.168.14.8 Answer: 192.168.14.16, 192.168.14.32, 192.168.14.208 233. A switch can be configured for three different forwarding modes based on ho w much of a frame is received before the forwarding process begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode will begin. Which one of the following groups refl ects the sequence of forwarding modes signified by the numbered arrows? Answer: 1) fast forward, 2) fragment free, 3) store-and-forward ?store-and-forward 2) fragment free 3) fast forward ?fragment free 2) fast forward 3) store-and-forward ?fast forward 2) store-and-forward 3) fragment free 234. Which of the following commands will display a communication message on a r outer before the router prompt is shown? Answer: banner motd * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. * ?message Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTE NT OF THE LAW. ?banner * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. * ?hostname (Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.) verst p formularen 235. A router needs to be added to OSPF area 0. Which commands should be used to enable OSPF on the router? (Choose two.) ?RouterA(config)# router ospf Answer: RouterA(config)# router ospf 1, RouterA(config-router)# network 192.168. 2.0 0.0.0.255 area 0 ?RouterA(config-router)# network 192.168.2.0 255.255.255.0 0 236. Refer to the graphic. Which of the following commands will configure router A for OSPF? ?router ospf 1 network 192.168.10.0 Answer: router ospf 1, network 192.168.10.64 0.0.0.63 area 0. network 192.168.10 .192 0.0.0.3 area 0 ?router ospf 1 network 192.168.10.64 255.255.255.192 network 192.168.10.192 255.255.255.252 ?router ospf 1 network 192.168.10.0 area 0 237. Which of the following protocols would exchange information between routers to share network addresses and their metrics? ?TCP Answer: RIP ?CSMA/CD

?Ethernet 238. Which ISDN device can be directly connected to a two-wire local loop in a N orth American city? ?a router with a serial interface ?a router with an S/T interface Answer: a router with a U interface ?an ISDN terminal adapter 239. The output of the show ip interfaces brief command indicates that Serial0 i s up but the line protocol is down. Which of the following are possible causes f or the line protocol being in the down state? (Choose two.) ?The clock rate is not set on the DTE. ?An incorrect default gateway is set on the router. ?A network is missing from the routing protocol configuration. Answer: The encapsulation on the Serial0 interface is incorrect., Keepalives are not being sent by the remote device 240. Which of the following is a characteristics of TCP? (Choose two.) Answer: data transport reliabilit, establishing, maintaining, and terminating vi rtual circuits ?encapsulation of packets in a data frame with source and destination MAC addres ses ?best-effort datagram delivery 241. Which statement is true regarding the command ip route 192.168.7.24 255.255 .255.248 192.168.7.9? (Choose two.) Answer: A packet destined for host 192.168.7.30 will be forwarded to address 192 .168.7.9., This command is used to define a static route 242. Which of the following application layer protocols use TCP? (Choose three.) Answer: SMTP, FTP, HTTP ?TFTP ?DHCP 243. Which terms refer to Frame Relay congestion management mechanisms? (Choose three.) Answer: BECN, DE, FECN ?LMI ?Inverse ARP 244. Which of the following router commands will verify that a path exists to a destination network? ?Router# show ip interfaces brief Answer: Router# show ip route ?Router# show cdp neighbors ?Router# show running-config ?Router# show protocols 245. When EIGRP is configured on a router, which table of DUAL information is us ed to calculate the best route to each destination router? ?router table Answer: topology table ?DUAL table ?CAM table ?ARP table 246. Refer to the graphic. Routers A and B have EIGRP configured and automatic s ummarization has been disabled on both routers. Which of the following commands is used on router A to summarize the attached routes, and to which interface is this command applied? (Choose two) Answer: ip summary-address eigrp 1 192.168.10.64 255.255.255.192, serial interfa ce on router A ?serial interface on router B 247. A router with two LAN interfaces, two WAN interfaces, and two loopback inte rfaces configured is operating with OSPF as its routing protocol. What is used by the OSPF process to assign the router ID?

?the IP address of the interface configured with priority 0 ?the OSPF area ID configured on the interface with the highest IP address Answer: the loopback with the highest IP address configured 52 ?the highest IP address on the LAN interfaces ?the highest IP address configured on the WAN interfaces 248. Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on w hich subnetwork does this address reside? ?172.0.0.0 ?172.16.134.0 Answer: 172.16.134.32 ?172.16.134.48 ?172.16.134.47 ?172.16.134.63 249. Which commands show when the last IGRP routing update was received? (Choose two.) Answer: Router# show ip protocols, Router# show ip route 250. When using access control lists to filter traffic, which of the following i s used to track multiple sessions occurring between hosts? ?IP addresses ?subnet masks Answer: port numbers ?routed protocols ?routing protocols ?interfaces 251. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, whic h of the following would describe this address? ?This is a useable host address. ?This is a broadcast address. Answer: This is a network address. ?This is not a valid address 252. The company network shown in the drawing has to be subnetted. The company h as leased the Class C IP address of 200.1.2.0. Which of the following network ad dresses and masks would be appropriate for one of the subnetworks? ?200.1.2.96 255.255.255.192 Answer: 200.1.2.160 255.255.255.224 ?200.1.2.80 255.255.255.224 ?200.1.2.32 255.255.255.240 253. When connectionless protocols are implemented at the lower layers of the OS I model, what is usually used to acknowledge that was received and to request th e retransmission of missing data? ?IP ?UDP ?Ethernet ?A connectionless acknowledgement Answer: An upper-layer, connection-oriented protocol or service 254. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices? ?Connection 1 rollover cable Connection 2 straight-through cable Connection 3 crossover cable ?Connection 1 crossover cable Connection 2 rollover cable Connection 3 crossover cable ?Connection 1 straight-through cable Connection 2 crossover cable

Connection 3 crossover cable Answer: Connection 1 straight-through cable Connection 2 crossover cable Connection 3 straight-through cable ?Connection 1 crossover cable Connection 2 straight-through cable Connection 3 crossover cable 255. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? ?Application ?Presentation ?Session Answer: Transport 256. What is true regarding network layer addressing? (Choose three.) ?Uses a flat structure ?Prevent broadcasts Answer: Hierarchical, Uniquely identifies each host, Contains a network portion 257. A PC can not connect to any remote websites, ping its default gateway, or p ing a printer that is functioning properly on the location segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? ?Use the ipconfig /all command at the host s command prompt. Answer: Use the ping 127.0.0.1 command at the command prompt. ?Use thetracerout e command at the command prompt to identify any failures on th e path to the gateway. ?Use FTP to check for connectivity to remote sites. ?Download a troubleshooting tool from the PC manufacturer s website. 258. Which type of meia is immune to EMI and RFI? (Choose two.) ?10 Base-T ?10 Base-2 ?10 Base-5 Answer: 100 Base-FX, 1000 Base LX 259. Refer to the exhibit. The command that is shown was issued on a PC. What do es the IP address 192.168.33.2 represent? ?IP address of the host ?Default gateway of the host ?IP address of the homepage for the host Answer: Primary domain name server for the host ?IP address of the website resolver1.mooki.local 260. Refer to the exhibit. The diagram represents the process of sending email b etween clients. Select the one that correctly identifies the component or protoc ol used at each numbered stage of the diagram. ?1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA ?1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA ?1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA ?1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA Answer: 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA 261. Which three statements characterize the transport layer protocols? (Choose three.) Answer: TCP and UDP port numbers are used by application layer protocols., TCP u ses windowing and sequencing to provide reliable transfer of data.,TCP is a conn ection-oriented protocol, UDP is a connectionless protocol. 262. Which OSI layers offers reliable, connection-oriented data communication se rvices? ?application ?presentation ?session

Answer: transport ?network 263. Examine the graphic with current configurations. Host A in the Clerical off ice failed and was replaced. Although a ping to 127.0.0.1 was successful, the re placement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the pro blem? ?Network card failure ?Network cables unplugged ?IP address incorrectly entered Answer: Subnet mask incorrectly entered 264. Refer to the exhibit. A network technician is trying to determine the corre ct IP address configuration for Host A. What is a valid configuration for Host A? ?IP address: 192.168.100.19; Subnet 16.1.2 Answer: IP address: 192.168.100.20; y: 192.168.100.17 ?IP address: 192.168.100.21; Subnet 168.100.18 ?IP address: 192.168.100.22; Subnet .1.5 ?IP address: 192.168.100.30; Subnet 168.1.1 ?IP address: 192.168.100.31; Subnet 168.100.18 Mask: 255.255.255.248; Default Gateway: 192. Subnet Mask: 255.255.255.240; Default Gatewa Mask: 255.255.255.248; Default Gateway: 192. Mask: 255.255.255.240; Default Gateway: 10.1 Mask: 255.255.255.240; Default Gateway: 192. Mask: 255.255.255.240; Default Gateway: 192.

265. As network administrator, what is the subnet mask that allows 510 hosts giv en the IP address 172.30.0.0? ?255.255.0.0 ?255.255.248.0 ?255.255.252.0 Answer: 255.255.254.0 ?255.255.255.0 ?255.255.255.128 266. What are three characteristics of CSMA/CD? (Choose three.) Answer: A device listens and waits until the media is not busy before transmitti ng., All of the devices on a segment see data that passes on the network medium. , After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. 267. Which of the following are the address ranges of the private IP addresses? (Choose three.) Answer: 10.0.0.0 to 10.255.255.255 ?200.100.50.0 to 200.100.25.255 55 Answer: 172.16.0.0 to 172.31.255.255, 192.168.0.0 to 192.168.255.255 Which three statements are true about network layer addressing? (Choose three.) answer: It uniquely identifies each host./It assists in forwarding packets acros s internetworks./It uses a logical 32-bit IPv4 address. It is not a configurable address. It is a physical address. It identifies the host from the first part of the address.

11 ***Caution***Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully , but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? Hosts A and B are not on the same subnet as host C. The IP addresses on the router serial interfaces are wrong. answer: The subnet mask on host C is improperly configured. The FastEthernet interface fa0/0 of router 1 is wrongly configured. 12 Which statement is true about the running configuration file in a Cisco IOS devi ce? answer: It affects the operation of the device immediately when modified. It is stored in NVRAM. It should be deleted using the erase running-config command. It is automatically saved when the router reboots. 13 ***Caution***An organization wants to create a subnet of the IP network 172.16.0 .0. This subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this network? 255.255.0.0 255.255.248.0 answer: 255.255.252.0 255.255.254.0 255.255.255.0 255.255.255.128 14 66 Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a particular process running on a specific server? answer: MAC address of the server and port number of the service IP address of the host and port number of the service MAC address of the host and port number of the service IP address of the server and port number of the service 15 Which three addresses belong to the category of public IP addresses? (Choose thr ee.) 127.0.0.1 answer: 196.1.105.6/132.11.9.99/46.1.1.97 16. Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this? Host X is assigned a network address. Host Y is assigned a multicast address. Host X and host Y belong to different networks. answer: ****The gateway addresses are broadcast addresses. 17 67 Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure? telnet 192.168.1.1 ping 192.168.1.1

ftp 192.168.1.1 answer: tracert 192.168.1.1 18 ***Caution***A host is transmitting a video over the network. How does the trans port layer allow this host to use multiple applications to transmit other data at the same time as the video transmission? It uses error control mechanisms. It uses a connectionless protocol only for multiple simultaneous transmissions. It uses multiple Layer 2 source addresses. answer: It uses multiple port numbers. 19 ***Caution***Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What information in this frame determines the correct destination application? timing and synchronization bits destination and source physical addresses destination and source logical network addresses answer: destination and source process numbers 20 ***Caution***Refer to the exhibit. Each media link is labeled. What type of cabl e should be used to connect the different devices? Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable answer: Connection 1 - straight-through cable Connection 2 - crossover cable Con nection 3 - rollover cable Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - stra ight-through cable Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - rollover cable 68 Connection 1 - straight-through cable Connection 2 - straight-through cable Conn ection 3 - straight-through cable 21 Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the net work technician do to solve this problem? Configure the description at interface serial 0/0/0. answer: Configure an IP address on interface serial 0/0/0. Remove the no shutdown command at interface serial 0/0/0 Reboot the router. 22 Refer to the exhibit. Which logical topology describes the exhibited network? star ring answer: point-to-point multi-access 23 Which three statements are true about transport layer protocols? (Choose three.) answer: TCP and UDP manage communication between multiple applications./TCP retr ansmits the packets for which the acknowledgment is not received./TCP acknowledg es received data. UDP exchanges frames between the nodes of the network. TCP has no mechanism to acknowledge transmission errors. UDP uses windowing and sequencing to provide reliable transfer of data.

24 Which OSI layer offers ordered data reconstruction services? application layer network layer presentation layer session layer answer: transport layer 25 Which password restricts Telnet access to the router? answer: enable enable secret console VTY 69 26 Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer requirements. Which three segments use Cable 2? (Choose three.) Segment 1 answer:****Segment 2/****Segment 4/****Segment 5 Segment 6 27 Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host? 70 answer: 10.10.10.32 192.168.1.5 192.168.1.99 192.168.2.100 28 Refer to the exhibit. A technician has connected the PC to the switch using a Ca tegory 6 UTP cable. Which two statements are true about this connection? (Choose two.) The cable that is used is an Ethernet crossover cable. The transmit pin of the cable is terminated to the receive pin. answer: The maximum distance between the switch and the PC can be 100 m./The max imum supported bandwidth is 1000 Mb/s. The Category 6 cable simulates a point-to-point WAN link and is unusable for thi s type of connection. 29 What is the effect of using the Router# copy running-config startup-config comma nd on a router? The contents of ROM will change. The contents of RAM will change. answer: The contents of NVRAM will change. The contents of flash will change. 30 ****Caution****Refer to the exhibit. The PC, the routing table of which is displ ayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong? answer:PC switch router interface fa0/0

router interface fa0/1 31 Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.) 10.1.12.79/28 answer:10.1.12.113/28;10.1.11.5/27;10.1.11.97/27 10.1.11.128/27 32 The network administrator wants to install a private application on a server. Wh ich range of port numbers is normally assigned to this application to make it accessible by clients? 0 to 255 49152 to 65535 1024 to 49151 answer: 0 to 1023 33 A network technician wants to configure an IP address on a router interface by u sing the ip address 192.168.1.0 255.255.255.0 command. Which prompt should the technician see when entering this command? Router> answer: Router(config-if)# Router# Router(config)# 34 Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts? Use the ipconfig command at the host. Use the ipconfig/all command at the destination. answer: Use the tracert command at the host. Use the ping command at the destination. 35 Which device should be used for routing a packet to a remote network? access switch DHCP server hub answer: router 36 Refer to the exhibit. What two facts can be determined from the session informat ion that is displayed? (Choose two.) answer:The protocol is a connection-oriented protocol.;The destination port indi cates that a Telnet session has been initiated. The source port does not support communication with the destination port that is listed. 37 Refer to the exhibit. A host is using NAT to connect to the Internet. Which thre e IP addresses enable this connection? (Choose three.) 10.1.1.63 answer:10.1.1.37/10.1.1.39/10.1.1.60 10.1.1.2 38 72 ****Caution****Refer to the exhibit. PC1 is unable to access PC2. To troubleshoo t this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the tech nician ping from PC1 to confirm this? 10.0.0.254

192.168.0.249 192.168.0.250 10.0.1.254 39 ****Caution****Refer to the exhibit. A host is connected to hub 1. Which combina tion of IP address, subnet mask, and default gateway can allow this host to function in the network? IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default .35 IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default .35 IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default .35 IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default .35 IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default .1 answer: IP address: 172.16.31.37 Subnet mask: 255.255.255.224 72.16.31.35 gateway: 172.16.31 gateway: 172.16.31 gateway: 172.16.31 gateway: 172.16.31 gateway: 172.16.30 Default gateway: 1

40 An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255 .224.0. Which IP address range can be used for this organization? 10.10.128.0 to 10.10.160.255 answer: 10.10.128.0 to 10.10.159.255 10.10.128.0 to 10.10.192.255 10.10.128.0 to 10.10.0.159 10.10.128.0 to 10.10.159.0 41 Which two types of media are useful for connecting two devices separated by a di stance of 500 meters? (Choose two.) 10 BASE-T 1000 BASE-TX 10 BASE-2 answer: 1000 BASE LX/1000 BASE-SX 42 Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A? Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130 Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2 Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1 Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130 43 Refer to the exhibit. To create the initial configuration, a network technician connected host A to the router using the connection that is shown. Which statement is true about this connection? It terminates at the Ethernet port of the router. answer: It provides out-of-band console access. It terminates at the serial interface of the router. It requires a Telnet client on host A to access the router. 44 73 Refer to the exhibit. Which list refers only to end devices? answer: D,E,F,G

A,H,B,C A,D,E,F A,D,E,G 45 Refer to the exhibit. The network administrator wants to remotely access the CLI of the router from PC1 using modem 1. Which port of the router should be connected to modem 2 to enable this access? console Ethernet answer: auxiliary serial 46 What is the result of using the clock rate 56000 command at the serial interface of the router? answer: The interface is configured as a DCE device. The interface timers are cleared. The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal. The IP address for the serial interface is configured. 47 What are two functions of the data link layer? (Choose two.) answer: It segments and reorders the data.;It controls how data is placed onto t he media. It generates signals to represent the bits in each frame. It encapsulates each packet with a header and a trailer to transfer it across th e local media. 48 Because of a security violation, the router password must be changed. What infor mation can be learned from these configuration entries? (Choose two.) Router(config)# line vty 0 4 Router(config-line)# password arj15 Router(config-line)# login This configuration allows users to connect by using a modem. Users must specify which line, 0 or 4, they wish to connect to when making a con nection. answer:This configuration allows users to connect to the router via the use of t he telnet command.;This configuration allows five users to make simultaneous con nections to this router. The configured password is automatically encrypted on the router. 49 ****CAUTION****What are three characteristics of CSMA/CD? (Choose three.) It monitors the media for presence of a data signal. answer: After detecting a collision, hosts can resume transmission after a rando m timer has expired./A jam signal is used to ensure that all hosts are aware tha t a collision has occurred.;It uses a token system to avoid collisions. 50 Which information is used by the router to determine the path between the source and destination hosts? the host portion of the IP address answer: the network portion of the IP address host default gateway address 74 the MAC address

Domain Knowledge - Weighted Score Max Points: 108 Earned Points: 75 Percentage: 69.4% Personalized Feedback has been generated based on your responses to this exam. C lick Here to view your Personalized Feedback Domain Knowledge - Binary Score Max Points: 50 Earned Points: 31 Percentage: 62.0% Close All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and Tradem arks 75 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet? ?The packet will be dropped. ?The packet will be forwarded via FastEthernet 0/0. answer: ?The packet will be forwarded to the destination host. ?The packet will be forwarded to the 192.168.1.3 next-hop address. Which of the following are the address ranges of the private IP addresses? (Choo se three.) answer:?10.0.0.0 to 10.255.255.255;?172.16.0.0 to 172.31.255.255;?192.168.0.0 to 192.168.255.255 ?127.16.0.0 to 127.31.255.255 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? ?Use the ipconfig /all command at the host s command prompt. answer: ?Use the ping 127.0.0.1 command at the command prompt. ?Use the traceroute command at the command prompt to identify any failures on th e path to the gateway. ?Use FTP to check for connectivity to remote sites. ?Download a troubleshooting tool from the PC manufacturer's website. Which prompt represents the appropriate mode used for the copy running-config st artup-config command ? Switch-6J> answer: Switch-6J# Switch-6J(config)# Switch-6J(config-if)# Switch-6J(config-line)# Refer to the exhibit. Which two statements describe the information that is repr esented in the header? (Choose two.) This is a server response. The UDP protocol is being used. answer: The destination port indicates a Telnet session./The return segment will contain a source port of 23. The next session originated from the client of this session will use the source port number 13358. Refer to the exhibit. Which set of devices contains only intermediary devices? answer: A, B, D, G A, B, E, F C, D, G, I

G, H, I, J Which range of port numbers are reserved for services that are commonly used by applications that run on servers? 0 to 255 answer: 0 to 1023 1024 to 49151 49152 to 65535 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320 .D632 and the destination MAC address 0030.8517.44C4. The packet inside the capt ured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? leaving host A leaving ATL 76 answer: leaving Dallas leaving NYC Which OSI layers offers reliable, connection-oriented data communication service s? application presentation session answer: transport network Refer to the exhibit. What is required on host A for a network technician to cre ate the initial configuration on Router1? an FTP client a Telnet client answer: a terminal emulation program a web browser A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error? access point host hub answer: router switch Refer to the exhibit. Assume all devices are using default configurations. How m any subnets are required to address the topology that is shown? 1345718 Refer to the exhibit. On the basis of the IP configuration that is shown, what i s the reason that Host A and Host B are unable to communicate outside the local network? Host A was assigned a network address. Host B was assigned a multicast address. Host A and Host B belong to different networks. answer: The gateway address was assigned a broadcast address. As network administrator, what is the subnet mask that allows 510 hosts given th e IP address 172.30.0.0? 255.255.0.0 255.255.248.0 255.255.252.0 answer: 255.255.254.0

255.255.255.0 255.255.255.128 Refer to the exhibit. The diagram represents the process of sending email betwee n clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram. 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA 1.MDA 2.SMT P 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA answer: 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA 77 Which three statements characterize the transport layer protocols? (Choose three .) answer: TCP and UDP port numbers are used by application layer protocols.;TCP us es windowing and sequencing to provide reliable transfer of data.;TCP is a conne ction-oriented protocol. UDP is a connectionless protocol. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A? IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.1 6.1.2 answer: IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gatewa y: 192.168.100.17 IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.1 68.100.18 IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1. 1.5 IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.1 68.1.1 IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.1 68.100.18 Refer to the exhibit. What is the correct destination socket number for a web pa ge request from Host A to the web server? 00-08-a3-b6-ce-46 answer: 198.133.219.25:80 http://www.cisco.com C 198.133.219.0/24 is directly connected, FastEthernet0/0 Refer to the exhibit. Each media link is labeled. What type of cable should be u sed to connect the different devices? Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable answer: Connection 1 - straight-through cable;Connection 2 - crossover cable;Con nection 3 - straight-through cable Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable Which combination of network id and subnet mask correctly identifies all IP addr

esses from 172.16.128.0 through 172.16.159.255? 172.16.128.0 255.255.255.224 172.16.128.0 255.255.0.0 172.16.128.0 255.255.192.0 answer: 172.16.128.0 255.255.224.0 172.16.128.0 255.255.255.192 Refer to the exhibit. When computer A sends a frame to computer D, what computer s receive the frame? only computer D answer: only computer A and computer D only computer B, computer C, and computer D all computers 78 What is true regarding network layer addressing? (Choose three.) uses a flat structure prevent broadcasts answer: heirarchical;uniquely identifies each host;contains a network portion Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication? Destination MAC:B BBB:BBBB:BBBB Destination IP: 172.22.0.62 Destination MAC:DD DD:DDDD:DDDD Destination IP: 172.22.0.75 Destination MAC:EEEE:EEEE:EEEE Destination IP: 172.22.0.62 Destination MAC:B BBB:BBBB:BBBB Destination IP: 172.22.0.75 answer: Destination MAC:EEEE:EEEE:EEEE Destination IP: 172.22.0.75 Destination MAC:DD DD:DDDD:DDDD Destination IP: 172.22.0.94 Examine the graphic with current configurations. Host A in the Clerical office f ailed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer cannot access the company network. With pro xy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the problem? network card failure network cables unplugged IP address incorrectly entered answer: subnet mask incorrectly entered When must a router serial interface be configured with the clock rate command? when the interface is functioning as a DTE device when the interface timers have been cleared when the connected DTE device is shut down when the interface is functioning as a DCE device Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) answer: The address that is assigned to the computer represents private addressi ng.;The computer is unable to communicate outside of the local network.;The pref ix of the computer address is /27. The IP address that is assigned to the computer is routable on the Internet. The IP address that is assigned to the computer is a broadcast address. Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.) This exchange is part of the three-way handshake. The source port indicates that a Telnet session has been initiated. The data is flowing from server to client. The destination port indicates that an HTTP session has been initiated. answer:The data listed is associated with the transport layer.;The source port d

oes not support communication with the destination port that is listed. Refer to the exhibit. What function does router RT_A need to provide to allow In ternet access for hosts in this network? answer:address translation DHCP services ftpd web server Which two functions of the OSI model occur at layer two? (Choose two.) 79 answer:physical addressing;media access control When connectionless protocols are implemented at the lower layers of the OSI mod el, what is usually used to acknowledge that the data was received and to request the retransmission of missing data? IP UDP Ethernet a connectionless acknowledgement answer: an upper-layer, connection-oriented protocol or service ****Caution****Refer to the exhibit. A network administrator remotely accesses t he CLI of RouterB from PC1 using Telnet. Which statement is true about this connection? The data is automatically encrypted. A Telnet server process is running on PC1. The connection is made through a VTY session on the router. A GET request was sent to RouterB to retrieve data during this session. 37 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.) answer:172.16.4.63 /26;172.16.4.191 /26;172.16.4.95 /27 172.16.4.221 /27 Refer to the exhibit. With the router running NAT, what IP addresses can be appl ied to the computer to allow access to the Internet? (Choose three.) 192.168.18.38 192.168.18.48 answer:192.168.18.49; 192.168.18.52; 192.168.18.59 192.168.18.63 In a Cisco IOS device, where is the startup-configuration file stored? Flash answer: NVRAM RAM ROM Refer to the exhibit. What two facts can be determined about the exhibited topol ogy? (Choose two.) answer: A single broadcast domain is present;Five collision domains exist. During the encapsulation process, which identifiers are added at the transport l ayer? two networks routing the packets answer: two applications communicating the data 80 two hosts at either end of the communication two nodes on the local network exchanging the frame Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? application presentation

session answer: transport ****CAUTION****Which type of media is immune to EMI and RFI? (Choose two.) 10 Base-T 10 Base-2 10 Base-5 answer:100 Base-FX;1000 Base LX Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which de vice will send a response to the initial tracert packet from PC1? Athens Ankara answer: London Paris PC4 Refer to the exhibit. The command that is shown was issued on a PC. What does th e IP address 192.168.33.2 represent? IP address of the host default gateway of the host IP address of the homepage for the host answer: primary domain name server for the host IP address of the website resolver1.mooki.local Which password is automatically encrypted when it is created? vty aux console answer: enable secret enable password Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physi cal layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the net work components on that segment. From the data given, which segments have the correct cable installed? (Choose three.) answer: segment1;segment3;segment4 segment5 48 Refer to the exhibit. Which logical topology best describes the exhibited networ k? star ring point-to-point 81 answer: multiaccess mesh What are three characteristics of CSMA/CD? (Choose three.) Devices can be configured with a higher transmission priority. A jam signal indicates that the collision has cleared and the media is not busy. answer: A device listens and waits until the media is not busy before transmitti ng.;All of the devices on a segment see data that passes on the network medium.; After detecting a collision, hosts can attempt to resume transmission after a ra ndom time delay has expired. Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?

issue the clock rate command on interface Serial 0/0/0 issue the description command on interface Serial 0/0/1 issue the ip address command on interface FastEthernet 0/0 answer: issue the no shutdown command on interface FastEthernet 0/1 network asso ciate has isolated the issue in this network to router B. What action can be preformed to correct the network issue? issue the clock rate command on interface Serial 0/0/0 issue the description command on interface Serial 0/0/1 issue the ip address command on interface FastEthernet 0/0 issue the no shutdown command on interface FastEthernet 0/ 1. Why was the OSI model developed? Answer:Standards were needed to allow any two systems to communicate. 2. The physical layer is concerned with the movement of _______ over a physical medium. Answer:bits 3. Which OSI model functions as a link between user support layers and network s upport layers? Answer:Transport 4. Routers function within which layer(s)? Answer:Physical,Data Link,Network 6. A multicast message is sent from _____ to _____? Answer:One source; multiple destinations 5. An IP header size = ? Answer:20 - 60 bytes long 7. Connection establishment in TCP is referred to as? Answer:Two-way handshaking 8. which layer exists between the Presentation and Transport layers? Answer:Session 9. In networking, what does ATM stand for? Answer:Asynchronous Transfer Mode 10. Which type of encoding was named after a city in England? Answer:Manchester 11. Which is USUALLY larger: WAN, LAN or MAN? Answer:WAN 12. What San Jose based company is currently considered to be the king of networ ks? Answer:Cisco 13. What does the 802 in the various network standards stand for? Answer:February 1980 14. Which of the following is not a network topology? Answer:Serial 15. What is the correct way to end an HTML page? Answer:</HTML> Q.1. what are the different types of delay associated with packet switched netwo rks? Answer: Processing, Transmission, Queuing, Propogation delays. Q.10.For client-server type request reply queries TCP/UDP/HTTP is the protocol t hat is widely used. Answer:b) Datagram networks: Answer Q.12 Arrange the following protocol layers from top to bottom. Answer: Application->Transport->Network->Link->Physical Q.14 Which feature is not offered by TCP? Answer:c) Constant bit rate: Answer Q.15 Which of the following is a list of TCP service features? Answer:b) Reliable, connection oriented, flow control: Answer Q.16 which of the following is a list of packet switching characteristics? Answer:b) Bandwidth shared, queues at routers, different paths possible: Answer Q.17 Data transfer between two neighboring routers involves only Answer:c) Physical layer, link layer, network layer: Answer

Q.18 When compared to transmission delay, propagation delay is always Answer:c) No restrictions-may be greater or smaller: Answer Q.19.which of these is true? Answer:d) In a layered structure underlying protocols can be changed: Answer 1. DNS is an ___Application_____layer protocol. Answer:c) Application 2. The __Authoratative _ nameserver certainly has the IP address of a host. Answer:d)Authoritative. 6. If one were to describe the mapping between IP addresses and hostnames, this mapping would be Answer:d) manymany 8. Suppose you use HTTP with nonpersistent connections, and send a request for a file containing three images. Estimate the time required to get the whole page in terms of round trip times. (Starting from clicking on the URL. Ignore transmission times, assume images and f iles are very small). Answer: ___8_ RTTs 9. Do the above, assuming persistent connections without pipelining. Answer: __5__ RTTs 10.Do the above, assuming persistent connections with pipelining. Answer: ___3_ RTTs 11.The default mode of HTTP 1.1 is Answer:b)Persistent connection with pipelining 1. The network layer is implemented in Answer:c. Hosts and routers 2. The functions of the network layer are Answer:b. Determining routes 3. A routing protocol is run in a datagram network Answer:b. When a link cost changes & c. Periodically The size of the routing table in router in a datagram network with N routers and E links is 4. Answer:a. O(N) http://www.ccna4u.org/2011/06/ccna-1-chapter-7-v4-0-answers-100-2011.html 1. Which options are properties of contention-based media access for a shared me dia? (Choose three.) answer: non-deterministic; less overhead; collisions exist 2. What is a primary purpose of encapsulating packets into frames? answer: facilitate the entry and exit of data on media 3.Refer to the exhibit. How many unique CRC calculations will take place as traf fic routes from the PC to the laptop? answer: 8 4. What is true concerning physical and logical topologies? answer: Logical topologies consist of virtual connections between nodes. 6. What are three characteristics of valid Ethernet Layer 2 addresses? (Choose t hree.) answer: They are 48 binary bits in length; They are considered physical addresse s; They are generally represented in hexadecimal format. 7.Refer to the exhibit. A frame is being sent from the PC to the laptop. Which s ource MAC and IP addresses will be included in the frame as it leaves RouterB? ( Choose two.) answer: source MAC Fa0/1 on RouterB; source IP PC

8. What determines the method of media access control? (Choose two.) answer: media sharing; logical topology 9. What is the purpose of the preamble in an Ethernet frame? answer: **is used for timing synchronization with alternating patterns of ones a nd zeros 10. What statements are true regarding addresses found at each layer of the OSI model? (Choose two.) answer : Layer 2 may identify devices by a physical address burned into the netw ork card; Layer 3 represents a hierarchical addressing scheme 11. Which statements describe the logical token-passing topology? (Choose two.) answer: Computers are allowed to transmit data only when they possess a token; E lectronic tokens are passed sequentially to each other. 12. Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? LLC MAC HDLC NIC 13. What is true regarding media access control? (Choose three.) answer: Ethernet utilizes CSMA/CD; defined as placement of data frames on the m edia; Data Link layer protocols define the rules for access to different media 14. What is a characteristic of a logical point-to-point topology? answer: The media access control protocol can be very simple. 15. What two facts are true when a device is moved from one network or subnet to another? (Choose two.) answer: The device will still operate at the same Layer 2 address; The Layer 3 a ddress must be reassigned to allow communications to the new network. 16. What is a function of the data link layer? answer: provides for the exchange data over a common local media 17. Which three factors should be considered when implementing a Layer 2 protoco l in a network? (Choose three.) answer: the geographic scope of the network; the physical layer implementation; the number of hosts to be interconnected 18. What is the primary purpose of the trailer in a data link layer frame? answer: support frame error detection 19. A network administrator has been asked to provide a graphic representation o f exactly where the company network wiring and equipment are located in the buil ding. What is this type of drawing? answer: physical topology 1. How many bits make up an IPv4 address? answer: 32 ** Refer to the exhibit. A network administrator has to develop an IP addressing sc heme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network wil l be allocated the same number of host addresses. Which network mask will be app ropriate to address the remaining networks? answer: 255.255.255.192

3. Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnett ed using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server s pr operties to allow connectivity to the network? answer: IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33 4.Refer to the exhibit. Which network prefix will work with the IP addressing sc heme shown in the graphic. answer : /27 Refer to the exhibit. A network administrator discovers that host A is having tr ouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible ca use of this problem? answer: NAT is required for the host A network. 6. What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts? answer: 255.255.255.0 7. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address? answer: This is a network address. 8. What three facts are true about the network portion of an IPv4 address? (Choo se three.) answer: is identical for all hosts in a broadcast domain; varies in length; is u sed to forward packets 9. What is the network address of the host 172.25.67.99 /23 in binary? answer: 10101100. 00011001.01000010.00000000 10. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong? answer: 172.16.192.160 1. What are the decimal and hexadecimal equivalents of the binary number 1001110 1? (Choose two.) A. 159 B. 157 C. 185 D. 0x9D E. 0xD9 F. 0x159 answer: B, D. To turn a binary number into decimal, you just have to add the val ues of each bit that is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 12 8 + 16 + 8 + 4 + 1 = 157. Hexadecimal is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F 16 characters total , from which to create all the numbers you ll ever need. So, if 1001 in binary is 9, then the hexadecimal equivalent is 9. Since we then have 1101, which is 13 in binary, the hexadecimal answer is D and the complete hexadecimal answer is 0x9D . 2. Which of the following allows a router to respond to an ARP request that is i ntended for a remote host? A. Gateway DP B. Reverse ARP (RARP) C. Proxy ARP D. I nverse ARP (IARP) E. Address Resolution Protocol (ARP) answer: C. Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway.

3. You want to implement a mechanism that automates the IP configuration, includ ing IP address, subnet mask, default gateway, and DNS information. Which protoco l will you use to accomplish this? A. SMTP B. SNMP C. DHCP D. ARP answer: C. Dynamic Host Configuration Protocol (DHCP) is used to provide IP info rmation to hosts on your network. DHCP can provide a lot of information, but the most common is IP address, subnet mask, default gateway, and DNS information. 4. What protocol is used to find the hardware address of a local device? A. RARP B. ARP C. IP D. ICMP E. BootP answer: B. Address Resolution Protocol (ARP) is used to find the hardware addres s from a known IP address. 5. Which of the following are layers in the TCP/IP model? (Choose three.) A. App lication B. Session C. Transport D. Internet E. Data Link F. Physical answer: A, C, D. This seems like a hard question at first because it doesn t make sense. The listed answers are from the OSI model and the question asked about th e TCP/IP protocol stack (DoD model). However, let s just look for what is wrong. F irst, the Session layer is not in the TCP/ IP model; neither are the Data Link a nd Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (A pplication/Process in the DoD). 6. Which class of IP address provides a maximum of only 254 host addresses per n etwork ID? A. Class A B. Class B C. Class C D. Class D E. Class E answer: C. A Class C network address has only 8 bits for defining hosts: 28 2 = 254. 7. Which of the following describe the DHCP Discover message? (Choose two.) A. I t uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. B. It uses UDP as the Transport layer protocol. C. It uses TCP as the Transport layer protocol. D. It does not use a layer 2 destination address. answer: A, B. A client that sends out a DHCP Discover message in order to receiv e an IP address sends out a broadcast at both layer 2 and layer 3. The layer 2 b roadcast is all Fs in hex, or FF:FF:FF:FF:FF:FF. The layer 3 broadcast is 255.25 5.255.255, which means all networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also called the Host-to-Host layer. 8. Which layer 4 protocol is used for a Telnet connection? A. IP B. TCP C. TCP/I P D. UDP E. ICMP answer: B. Although Telnet does use TCP and IP (TCP/IP), the question specifical ly asks about layer 4, and IP works at layer 3. Telnet uses TCP at layer 4. 9. Which statements are true regarding ICMP packets? (Choose two.) A. They ackno wledge receipt of a TCP segment. B. They guarantee datagram delivery. C. They ca n provide hosts with information about network problems. D. They are encapsulate d within IP datagrams. E. They are encapsulated within UDP datagrams. answer: C, D. Internet Control Message Protocol (ICMP) is used to send error mes sages through the network, but they do not work alone. Every segment or ICMP pay load must be encapsulated within an IP datagram (or packet). 10. Which of the following services use TCP? (Choose three.) A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP answer: B, D, E. SMTP, FTP, and HTTP use TCP. 11. Which of the following services use UDP? (Choose three.) A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP answer: A, C, F. Explanation: DHCP, SNMP, and TFTP use UDP. SMTP, FTP, and HTTP use TCP.

12. Which of the following are TCP/IP protocols used at the Application layer of the OSI model? (Choose three.) A. IP B. TCP C. Telnet D. FTP E. TFTP answer: C, D, E. Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP) ar e all Application layer protocols. IP is a Network layer protocol. Transmission Control Protocol (TCP) is a Transport layer protocol. 13. The following illustration shows a data structure header. What protocol is t his header from? A. IP B. ICMP C. TCP D. UDP E. ARP F. RARP Bit 0 Bit 15 Bit 16 Bit 31 Source port (16) Destination port (16) Sequence number (32) Acknowledgmen t number (32) Header length (4) Reserved (6) Code bits (6) Window (16) Checksum (16) Urgent (16) Options (0 or 32 if any) Data (varies) 24 bytes answer: C. First, you should know easily that only TCP and UDP work at the Trans port layer, so now you have a 50/50 shot. However, since the header has sequenci ng, acknowledgment, and win- dow numbers, the answer can only be TCP. 14. If you use either Telnet or FTP, which is the highest layer you are using to transmit data? A. Application B. Presentation C. Session D. Transport answer: A. Both FTP and Telnet use TCP at the Transport layer; however, they bot h are Application layer protocols, so the Application layer is the best answer f or this question. 15. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? A. Applicati on B. Host-to-Host C. Internet D. Network Access answer: C. The four layers of the DoD model are Application/Process, Host-to-Hos t, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model. 16. Which two of the following are private IP addresses? A. 12.0.0.1 B. 168.172. 19.39 C. 172.20.14.36 D. 172.33.194.30 E. 192.168.24.43 answer: C, E. Class A private address range is 10.0.0.0 through 10.255.255.255. Class B private address range is 172.16.0.0 through 172.31.255.255, and Class C private address range is 192.168.0.0 through 192.168.255.255. 17. What layer in the TCP/IP stack is equivalent to the Transport layer of the O SI model? A. Application B. Host-to-Host C. Internet D. Network Access answer: B. The four layers of the TCP/IP stack (also called the DoD model) are A pplication/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model. 18. Which statements are true regarding ICMP packets? (Choose two) A. ICMP guara ntees datagram delivery. B. ICMP can provide hosts with information about networ k problems. C. ICMP is encapsulated within IP datagrams. D. ICMP is encapsulated within UDP datagrams. answer: B, C. ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and because it is used for diagnostic s, it will provide hosts with information about network problems. 19. What is the address range of a Class B network address in binary? A. 01xxxxx x B. 0xxxxxxx C. 10xxxxxx D. 110xxxxx answer: C. The range of a Class B network address is 128 191. This makes our binar y range 10xxxxxx. 20. Which of the following protocols uses both TCP and UDP? A. FTP B. SMTP C. Te lnet D. DNS answer: D. DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address. 1. What application layer protocol is commonly used to support for file transfer s between a client and a server?

answer: FTP 2. What are two forms of application layer software? (Choose two.) answer: applications; services 3. A network administrator is designing a network for a new branch office of twe nty-five users. What are the advantages of using a client-server model? (Choose two.) answer: centralized administration; security is easier to enforce There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP?

Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol?

Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels 4. What is the purpose of resource records in DNS? answer: used by the server to resolve names 5. What is the automated service that matches resource names with the required I P address? answer: DNS 6. What three protocols operate at the Application layer of the OSI model? (Choo se three.) answer: DNS; SMTP; POP 7. What are three properties of peer-to-peer applications? (Choose three.) answer: acts as both a client and server within the same communication; hybrid m ode includes a centralized directory of files; can be used in client-server netw orks. 8. Which application layer protocols correctly match a corresponding function? ( Choose two.) answer: HTTP transfers data from a web server to a client; Telnet provides a vir tual connection for remote access 9. Which email components are used to forward mail between servers? (Choose two. ) answer: MTA; SMTP 10. As compared to SSH, what is the primary disadvantage of telnet? answer: does not support encryption 11. Which statements are correct concerning the role of the MTA in handling emai l? (Choose three.)

answer: receives email from the client s MUA; passes email to the MDA for final de livery; uses SMTP to route email between servers 12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) answer: HTTP; HTTPS 13. A small home network has been installed to interconnect three computers toge ther for gaming and file sharing. What two properties represent this network typ e? (Choose two.) answer: Security is difficult to enforce; A computer that responds to a file sha ring request is functioning as a server. 14. Which layer of the OSI model supplies services that allow user to interface with the network? answer: application 16. What are two characteristics of peer-to-peer networks? (Choose two.) answer: decentralized resources; resource sharing without a dedicated server 17. What application layer protocol describes the services that are used for fil e sharing in Microsoft networks? answer: SMB 18. What are two characteristics of clients in data networks? (Choose two.) answer: initiate data exchanges; may upload data to servers 19. What is the role of the OSI application layer? answer: provides the interface between the applications on either end of the net work 20. How does the application layer on a server usually process multiple client r equest for services? answer: uses support from lower layer functions to distinguish between connectio ns to the service CCNA 1 Chapter 11 V4.0 Answers 100% 2011 2. In a Cisco router, when do changes made to the running-configuration take eff ect? answer: **as the commands are entered 6. Users in the network are experiencing slow response time when doing file tran sfers to a remote server. What command could be issued to determine if the route r has experienced any input or output errors? answer: show interfaces 8. What command is used to change the default router name to Fontana? answer: Router(config)# hostname Fontana 12. Immediately after a router completes its boot sequence, the network administ rator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose t wo.) answer: show startup-config; show running-config 13. Which three terms correctly define the forms of help available within the Ci

sco IOS? (Choose three.) answer: hot keys; context-sensitive; command syntax check 15. Which combination of keys would be used at the CLI prompt to interrupt a pin g or traceroute process? answer: Ctrl-Shift-6 17. In a Cisco device, where is the IOS file stored prior to system startup? answer: Flash 19. A network administrator needs to keep the user ID, password, and session con tents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen? answer: SSH http://www.ccna4u.org/2011/06/ccna-1-chapter-4-v4-0-answers-100-updated-2011.htm l

1.Refer to the exhibit. What two pieces of information can be determined from th e output that is shown? (Choose two.) answer: The local host is using three client sessions; The local host is using w eb sessions to a remote server. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the resp onse from the server? answer: 80 3. Which information is found in both the TCP and UDP header information? answer: source and destination 4. Which is an important characteristic of UDP? answer: minimal delays in data delivery 5.Refer to the exhibit. The initial TCP exchange of data between two hosts is sh own in the exhibit. Assuming an initial sequence number of 0, what sequence numb er will be included in Acknowledgment 2 if Segment 6 is lost? answer: 3431 8. Why is flow control used for TCP data transfer? answer: to prevent the receiver from being overwhelmed by incoming data 9. During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message? answer: The packets will be delivered and reassembled at the destination. 10. With TCP/IP data encapsulation, which range of port numbers identifies all w ell-known applications? answer: 0 to 1023 11. Which transport layer protocol provides low overhead and would be used for a pplications which do not require reliable data delivery? answer: UDP 12. What are two features of the User Datagram Protocol (UDP)? (Choose two.) answer: low overhead; connectionless 13. What mechanism is used by TCP to provide flow control as segments travel fro

m source to destination? answer: window size 14. What is dynamically selected by the source host when forwarding data? answer: source port 15. Why are port numbers included in the TCP header of a segment? answer: to enable a receiving host to forward the data to the appropriate applic ation 16. Which two options represent Layer 4 addressing? (Choose two.) answer: identifies the communicating applications; identifies multiple conversat ions between the hosts 17. Which three features allow TCP to reliably and accurately track the transmis sion of data from source to destination? answer: flow control; session establishment; numbering and sequencing 18. Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? answer: transport 20. Which event occurs during the transport layer three-way handshake? answer: **TCP initializes the sequence numbers for the sessions. CCNA 1 Chapter 3 V4.0 Answers 100% Updated 2011 1. What application layer protocol is commonly used to support for file transfer s between a client and a server? answer: FTP 2. What are two forms of application layer software? (Choose two.) answer: applications; services 3. A network administrator is designing a network for a new branch office of twe nty-five users. What are the advantages of using a client-server model? (Choose two.) answer: centralized administration; security is easier to enforce 4. What is the purpose of resource records in DNS? answer: used by the server to resolve names 5. What is the automated service that matches resource names with the required I P address? answer: DNS 6. What three protocols operate at the Application layer of the OSI model? (Choo se three.) answer: DNS; SMTP; POP 7. What are three properties of peer-to-peer applications? (Choose three.) answer: acts as both a client and server within the same communication; hybrid m ode includes a centralized directory of files; can be used in client-server netw orks. 8. Which application layer protocols correctly match a corresponding function? ( Choose two.) answer: HTTP transfers data from a web server to a client; Telnet provides a vir tual connection for remote access 9. Which email components are used to forward mail between servers? (Choose two.

) answer: MTA; SMTP 10. As compared to SSH, what is the primary disadvantage of telnet? answer: does not support encryption 11. Which statements are correct concerning the role of the MTA in handling emai l? (Choose three.) answer: receives email from the client s MUA; passes email to the MDA for final de livery; uses SMTP to route email between servers 12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) answer: HTTP; HTTPS 13. A small home network has been installed to interconnect three computers toge ther for gaming and file sharing. What two properties represent this network typ e? (Choose two.) answer: Security is difficult to enforce; A computer that responds to a file sha ring request is functioning as a server. 14. Which layer of the OSI model supplies services that allow user to interface with the network? answer: application 16. What are two characteristics of peer-to-peer networks? (Choose two.) answer: decentralized resources; resource sharing without a dedicated server 17. What application layer protocol describes the services that are used for fil e sharing in Microsoft networks? answer: SMB 18. What are two characteristics of clients in data networks? (Choose two.) answer: initiate data exchanges; may upload data to servers 19. What is the role of the OSI application layer? answer: provides the interface between the applications on either end of the net work 20. How does the application layer on a server usually process multiple client r equest for services? answer: uses support from lower layer functions to distinguish between connectio ns to the service CCNA 1 Chapter 11 V4.0 Answers 100% 2011 2. In a Cisco router, when do changes made to the running-configuration take eff ect? answer: **as the commands are entered 6. Users in the network are experiencing slow response time when doing file tran sfers to a remote server. What command could be issued to determine if the route r has experienced any input or output errors? answer: show interfaces 8. What command is used to change the default router name to Fontana? answer: Router(config)# hostname Fontana

12. Immediately after a router completes its boot sequence, the network administ rator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose t wo.) answer: show startup-config; show running-config 13. Which three terms correctly define the forms of help available within the Ci sco IOS? (Choose three.) answer: hot keys; context-sensitive; command syntax check 15. Which combination of keys would be used at the CLI prompt to interrupt a pin g or traceroute process? answer: Ctrl-Shift-6 17. In a Cisco device, where is the IOS file stored prior to system startup? answer: Flash 19. A network administrator needs to keep the user ID, password, and session con tents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen? answer: SSH http://www.ccna4u.org/2011/06/ccna-1-chapter-4-v4-0-answers-100-updated-2011.htm l

1.Refer to the exhibit. What two pieces of information can be determined from th e output that is shown? (Choose two.) answer: The local host is using three client sessions; The local host is using w eb sessions to a remote server. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the resp onse from the server? answer: 80 3. Which information is found in both the TCP and UDP header information? answer: source and destination 4. Which is an important characteristic of UDP? answer: minimal delays in data delivery 5.Refer to the exhibit. The initial TCP exchange of data between two hosts is sh own in the exhibit. Assuming an initial sequence number of 0, what sequence numb er will be included in Acknowledgment 2 if Segment 6 is lost? answer: 3431 8. Why is flow control used for TCP data transfer? answer: to prevent the receiver from being overwhelmed by incoming data 9. During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message? answer: The packets will be delivered and reassembled at the destination. 10. With TCP/IP data encapsulation, which range of port numbers identifies all w ell-known applications? answer: 0 to 1023

11. Which transport layer protocol provides low overhead and would be used for a pplications which do not require reliable data delivery? answer: UDP 12. What are two features of the User Datagram Protocol (UDP)? (Choose two.) answer: low overhead; connectionless 13. What mechanism is used by TCP to provide flow control as segments travel fro m source to destination? answer: window size 14. What is dynamically selected by the source host when forwarding data? answer: source port 15. Why are port numbers included in the TCP header of a segment? answer: to enable a receiving host to forward the data to the appropriate applic ation 16. Which two options represent Layer 4 addressing? (Choose two.) answer: identifies the communicating applications; identifies multiple conversat ions between the hosts 17. Which three features allow TCP to reliably and accurately track the transmis sion of data from source to destination? answer: flow control; session establishment; numbering and sequencing 18. Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? answer: transport 20. Which event occurs during the transport layer three-way handshake? answer: **TCP initializes the sequence numbers for the sessions. Which of the following IP address ranges are considered part of the Class C netw ork? answer: 192.0.0.0 - 223.255.255.255 In IPv6, the anycast feature allows? answer: senders to address to packets to any member of a group of nodes What is the size of today's standard (IPv4) IP address? answer: 4 byte An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 56-kbps modem channel? answer: 337 sec An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1 Mbps modem channel? answer: 18.8 sec An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 10 Mbps modem channel? answer: 1.88 sec An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 100 Mbps modem channel? answer: 0.18 sec A system has an n-layer protocol hierarchy. Applications generate messages of le ngth M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers? answer: nh/(M+hn) Which layer of the OSI model ensures reliable, end-to-end communications? answer: Transport Which layer of the OSI model provides routing functionality? answer: Network Which layer of the OSI model translates the data from upper-layer protocols into

electrical signals and places them on the network media? answer: Physical You are a consultant designing a network for a company with more than 1000 users . Which 802 standard would you implement to ensure that bandwidth would be suffi cient and equal without bridging or additional segments? answer: 802.5 You have a limited budget and need to design a network for 50 users. Which 802 s tandard would you implement? answer: 820.3 You are installing a Windows 95/98 based TCP/IP network. You accidentally set work station B to the same IP address as workstation A. Which workstation(s) will rec eive an error message? answer: Workstation B You are installing a Windows 95/98 based TCP/IP network. You accidentally set work station B to the same IP address as workstation A. Which workstation(s) will hav e a valid IP address? answer: Workstation A Unix uses which method to resolve Transport layer names into logical network add resses? answer: NDS Which of the following protocols use a connectionless transport? answer: TFTP and NetBIOS Which protocols use a connection-oriented transport? answer: http Which name resolution system is implemented with TCP/IP by default? answer: DNS Which OSI model layer has both a MAC sublayer and an LLC 12 sublayer? answer: Data Link Which OSI model layer is responsible for establishing, maintaining, and breaking down dialog? answer: Session Which OSI layer is responsible for network services such as messaging and file t ransfer? answer: Application Which OSI layer is responsible for building and tearing down packets? answer: Network On an Ethernet network, every station must have a _______________. answer: NIC Which type of hub doesn t require power? answer: Passive You are the administrator of a 100-station Ethernet network. Your users are comp laining of slow network speeds. What could you replace your hub with to increase your network throughput? answer: Switch At which OSI model layer do routers operate? answer: Network Which of the following is a MAC address? answer: 01:A5:BB:A7:FF:60 Which three factors should be considered when implementing a Layer 2 protocol in a network? answer: the geographic scope of the network +the physical layer implementation+t he number of hosts to be interconnected Refer to the exhibit. Assuming that the network in the exhibit is converged mean ing the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for http:// www.server/ answer: 00-0c-85-cf-65-c0 Which options are properties of contention-based media access for a shared media ? answer: non-deterministic+less overhead+collisions exist

What is true concerning physical and logical topologies? answer: The logical topology is always the same as the physical topology. Physical topologies are concerned with how a network transfers frames. answer: Logical topologies consist of virtual connections between nodes. What is true regarding media access control answer: Ethernet utilizes CSMA/CD+defined as placement of data frames on the med ia+Data Link layer protocols define the rules for access to different media Which statements describe the logical token-passing topology? answer: Computers are allowed to transmit data only when they possess a token.+E lectronic tokens are passed sequentially to each other. A network administrator has been asked to provide a graphic representation of ex actly where the company network wiring and equipment are located in the building . What is this type of drawing? answer: physical topology What is the purpose of the preamble in an Ethernet frame? answer: is used for timing synchronization with alternating patterns of ones and zeros What statements are true regarding addresses found at each layer of the OSI mode l? answer: Layer 2 may identify devices by a physical address burned into the netwo rk card+Layer 3 represents a hierarchical addressing scheme Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit? answer: Network 1 uses CSMA/CD and Network 3 uses CSMA/CA. Refer to the exhibit. How many unique CRC calculations will take place as traffi c routes from the PC to the laptop? answer: 4 Refer to the exhibit. A frame is being sent from the PC to the laptop. Which sou rce MAC and IP addresses will be included in the frame as it leaves RouterB? answer: source MAC - Fa0/1 on RouterB+source IP - PC Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? answer: mac What two facts are true when a device is moved from one network or subnet to ano ther? answer: The device will still operate at the same Layer 2 address.+The Layer 3 a ddress must be reassigned to allow communications to the new network. What is a function of the data link layer? answer: provides for the exchange data over a common local media What is a characteristic of a logical point-to-point topology? answer: The media access control protocol can be very simple. What is a primary purpose of encapsulating packets into frames? answer: facilitate the entry and exit of data on media What is the primary purpose of the trailer in a data link layer frame? answer: support frame error detection What are three characteristics of valid Ethernet Layer 2 addresses? answer: They are 48 binary bits in length.+They are considered physical addresse s.+They are generally represented in hexadecimal format. _______ is used to identify the destination machine when transmitting data throu gh the internet. answer: IP Address A collection of terminals, computers, servers and components that allows easy fl ow of data and use of resources between one another __________. answer: Network The binary value for 128 is ____________. answer: 10000000 MAC stands for____________. answer: Media Access Control NIC stands for____________. answer: Network Interface Card

0.1.0.1 is an example of ___________. answer: Class A ___________ is a default subnet mask for Class A. answer: 255.0.0.0 For an IP address - 120.6.12.200, the binary value for the network address is___ answer: 0111100.00000000.00000000.00000000 . ___________________ is the default mask for Class A network. answer: 255.0.0.0 The maximum decimal value for a byte is 255 answer: true Why do you need subnet? answer: All the above Subnets organize the hosts into logical groups. answer: True What is the network address for the IP address 12.10.200.100? answer: 12.0.0.0 What is the default subnet mask for class b address? answer: 255.255.0.0 Which of these is a private IP address? answer: All of the above What is the maximum number of subnets that can be assigned to networks when usin g the address 131.107.0.0 with a subnet mask of 255.255.240.0? answer: 14 Using the address 192.64.10.0/28 how many subnets and hosts are available? answer: 14 networks and 14 hosts Given an IP address of 131.107.2.160 and a subnet mask of 255.255.255.192, to wh ich subnet does the host belong? answer: 131.107.2.128 What is the total number of hosts in Class B address? answer: 65533 What is the total number of network id available in Class A? answer: 126 What is the network address for a host with the IP address 123.200.8.68/28 ? answer: 123.200.8.64 +123.200.8.65 If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary, which of the following is the correct bit pattern for th e first octet? answer: 0xxxxxxx +10xxxxxx Which of the following hardware devices can be used to segment your network? answer: Router +Media converter Using a Class C address range 192.168.21.12, your network needs twenty-eight sub nets. Which subnet mask should you use? answer: 255.255.255.248 +255.255.255.252 You have been assigned a Class C network address. Your manager has asked you to create 30 subnets with at least 5 hosts per subnet for the different departments in your organization. What should the subnet mask be to create 30 subne answer: 255.255.255.248 + 255.255.255.248 Your ISP has provided you the following Class B network range 131.107.0.0/24. Wh ich of the following statements is true regarding this network? answer: There are 254 usable hosts per subnet +There is one usable network Using the following address and subnet mask 195.106.14.0/24, what is the total n umber of networks and the total number of host per network? answer: 1 network with 254 hosts. +2 networks with 128 hosts. IP addresses use hierarchical numbering. What portion of the address identifies the network number? answer: Class of first octet. +Assignments of DHCP. Looking at this address 255.255.255.255, which one of the following is true? answer: IP, a flooded broadcast. + IP, a directed broadcast. What does ISP stand for?

answer: Internet Service Provider How many USABLE HOST addresses are available on a class B, unsubnetted network? answer: 2 raised to the 16 power minus 2 How many unique Class B NETWORK addresses are there? answer: 2 raised to the 14 power There are ___ bits in an IP address. answer: 32 In a Class A address where 4 bits have been borrowed for subnetting, ____ bits a re left for host addresses. answer: 20 What is the high order bit pattern that all Class B addresses start with in thei r first octet? answer: 10__________ What is the high order bit pattern that all Class B addresses start with in thei r first octet? answer: Host ID What is the broadcast address of the second usable subnet in Class C where 4 bit s were borrowed? answer: x.x.x.47 Every eight bits in an IP address is referred to as ____ ? answer: octect The source and destination address appear in an IP packet s ____ answer: header Hosts that reside on a network with the same network ID can communicate directly with each other. answer: ture Given a Class A address that has been subnetted (8 bits borrowed), what is the s ubnet mask? answer: 255.255.0.0 Using a Class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use? answer: 255.255.255.224 +255.255.255.240 In the original ARPANET, _______ were directly connected together. answer: IMPs _______ was formed to connect universities with no defense ties. answer: CSNET This was the first network. answer: ARPANET Which organization has authority over interstate and international commerce in t he communications field? answer: FCC _______ are special-interest groups that quickly test, evaluate, and standardize new technologies. answer: Forums Which agency developed standards for physical connection interfaces and electron ic signaling specifications? answer: EIA _______ is the protocol suite for the current Internet. answer: TCP/IP A version of the _______ operating system included TCP/IP. answer: UNIX The _______ oversees the IETF and the IRTF. answer: IAB The _______ maintains and supports IAB. answer: ISOC _______ is the precursor to ICANN. answer: IANA _______ refers to the structure or format of the data, meaning the order in whic h they are presented..

answer: Syntax ________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. answer: Semantics _______ refers to two characteristics: when data should be sent and how fast it can be sent. answer: Timing An RFC, during its lifetime, falls into one of _______ maturity levels. A. 5 B. 2 C. 4 . D. None of the above answer: none of the above A proposed standard is elevated to ________ standard status after at least two s uccessful tries. answer: draft An RFC is labeled ________ if it must be implemented by all Internet systems. answer: required Why was the OSI model developed? answer: standards were needed to allow any two systems to communicate The _______ model shows how the network functions of a computer ought to be orga nized. answer: OSI The physical layer is concerned with the movement of _______ over the physical m edium. answer: bits The OSI model consists of _______ layers. answer: seven In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. answer: removed In the OSI model, when data is transmitted from device A to device B, the header from As layer 5 is read by Bs _______ layer. answer: session In the OSI model, which layer functions as a liaison between user support layers and network support layers? answer: transport layer In the OSI model, what is the main function of the transport layer? answer: process-to-process message delivery In the OSI model, encryption and decryption are functions of the ________ layer. answer: presentation In the OSI model, which of the following is an application layer service? A) network virtual terminal B) file transfer, access, and management C) mail service answer: all of the above When a host on network A sends a message to a host on network B, which address d oes the router look at? answer: logical To deliver a message to the correct application program running on a host, the _ ______ address must be consulted. answer: port IPv6 has _______ -bit addresses. answer: 128 ICMPv6 includes _______. A) IGMP B) ARP C) RARP answer: a and b The ______ layer is responsible for moving frames from one hop (node) to the nex t. answer: data link The ______ layer adds a header to the packet coming from the upper layer that in cludes the logical addresses of the sender and receiver. answer: network The_________ layer is responsible for the delivery of a message from one process to another.

answer: transport The Internetworking Protocol (IP) is a ________ protocol. A) reliable B) connection-oriented C) both a and b answer: none of the above _______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. answer: UDP __________ provides full transport layer services to applications. answer: TCP The ________ address, also known as the link address, is the address of a node a s defined by its LAN or WAN. answer: physical Ethernet uses a ______ physical address that is imprinted on the network interfa ce card (NIC). answer: 6-byte Which of the following can be an Ethernet physical address? answer: 07:01:02:01:2C:4B A port address in TCP/IP is ______ bits long. answer: 16 IP Version 5 was a proposal based on the ______ model. This version never went b eyond the proposal stage due to extensive layer changes and the projected expens e. answer: OSI 10BASE2 uses _______ cable while 10BASE5 uses _______. answer: thin coaxial, thick coaxial _______ specifies a physical star topology featuring a central hub and twisted-p air cable as the medium. answer: 10BASE-T Frame Relay operates in the _______. answer: physical and data link layers Which ATM layer has a 53-byte cell as an end product? answer: ATM The IP protocol uses the _______ sublayer. answer: AAL5 Repeaters function in the _______ layer. answer: physical Bridges function in the _______ layers. answer: physical and data link A bridge has access to the _______ address of a station on the same network. answer: physical Routers function in the _______ layers. answer: physical, data link, and network _______ has a higher transmission rate in the downstream direction than in the u pstream direction. answer: ADSL _______ is suitable for businesses that require comparable upstream and downstre am data rates. answer: SDSL _______ was designed as an alternative to the T-1 line. answer: HDSL A traditional TV network transmits signals _______. answer: downstream The second generation of cable networks is called a(n) _______ network. answer: HFC An HFC network uses _______ as the medium from the cable TV office to the fiber node. answer: optical fiber In an ESS the _______ station is mobile. answer: BSS In an ESS the _______ stations are part of a wired LAN.

answer: AP SONET is a standard for _______ networks. answer: fiber-optic cable SONET is an acronym for _______ Network. answer: Synchronous Optical PPP is a _______ layer protocol. answer: physical and data link Identify the class of the following IP address: 4.5.6.7. answer: class A Identify the class of the following IP address: 229.1.2.3. answer: class D Identify the class of the following IP address: 191.1.2.3. answer: class B Which of the following is true of the IP address 231.1.2.3? answer: The class is D. Which of the following is true of the IP address 192.0.0.10? answer: The network address is 192.0.0.0. Using the direct broadcast address, a _______ sends a packet to _______ on the n etwork. answer: router; all other hosts Using the limited broadcast address, a _______ sends a packet to _______ on the network. answer: host; all other hosts The loopback address is used to send a packet from the _______ to _______. A) host; all other hosts B) router; all other hosts C) host; a specific host answer: none of the above A host can get its IP address from its server by using _______ as the source add ress and _______ as the destination address. answer: 0.0.0.0; 255.255.255.255 A host with an IP address of 142.5.0.1 needs to test internal software. What is the destination address in the packet? answer: 127.1.1.1 What is the result of ANDing 255 and 15? answer: 15 What is the result of ANDing 0 and 15? answer: 0 What is the result of ANDing 254 and 15? answer: 14 What is the result of ANDing 192 and 65? answer: 64 A subnet mask in class A has 14 1s. How many subnets does it define? answer: 64 A subnet mask in class B has 19 1s. How many subnets does it define? answer: 8 A subnet mask in class C has 25 1s. How many subnets does it define? answer: 2 Which one is not a contiguous mask? answer: 255.148.0.0 Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? answer: 201.14.78.64 Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is th e subnet address? answer: 180.25.0.0 Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the s ubnet address? answer: 18.240.0.0 The subnet mask for a class C network is 255.255.255.192. How many subnetworks a re available?

answer: 4 The subnet mask for a class B network is 255.255.224.0. How many subnetworks are available? answer: 8 The subnet mask for a class C network is 255.255.255.248. How many subnetworks a re available? answer: 16 The number of addresses in a class C block is _______. answer: 256 The number of addresses in a class B block is _______. answer: 65,534 The number of addresses in a class A block is _______. answer: 16,777,216 An organization has been granted a class A address. If the organization has 256 subnets, how many addresses are available in each subnet (including special addr esses)? answer: 65,534 An organization has been granted a class B address. If the organization has 64 s ubnets, how many addresses are available in each subnet (including special addre sses)? answer: 1024 An organization has been granted a class C address. If the organization has 4 su bnets, how many addresses are available in each subnet (including special addres ses)? A) 4 B) 1024 C) 256 answer: none of the above In classless addressing, __________ is assigned to a organization. answer: a variable-length block The number of addresses assigned to an organization in classless addressing ____ ___. answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? A) 2.4.6.5 B) 2.4.6.15 C) 2.4.6.62 answer: none of the above Which address could be the beginning address of a block of 256 classless address es? answer: 2.4.6.0 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/27? answer: 12.2.2.64 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/10? answer: 12.0.0.0 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? answer: 12.2.2.112 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/24. answer: 256 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/30. answer: 4 What is the last address of a block of classless addresses if one of the address es is 12.2.2.127/28? answer: 12.2.2.127 What is the last address of a block of classless addresses if one of the address

es is 12.2.2.6/30? answer: 12.2.2.7 In fixed-length subnetting, the number of subnets must _______. answer: be a power of 2 An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length? answer: /24 An organization is granted a block; one address is 2.2.2.64/25. If the subnet pr efix length is /28, what is the maximum number of subnets? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.64/28. How many addresses are granted? answer: 16 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.32.0/27. How many addresses are granted? answer: 32 What is the default mask for class A in CIDR notation? answer: /8 What is the default mask for class B in CIDR notation? answer: /16 What is the default mask for class C in CIDR notation? answer: /24 In ________ addressing, when an address is given, we can find the beginning addr ess and the range of addresses. answer: classful In classless addressing, the ______ is another name for the common part of the a ddress range. answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . answer: suffix In classless addressing, the prefix length defines the _____________. answer: mask In a block, the prefix length is /22; what is the mask? answer: 255.255.252.0 In a block, the prefix length is /15; what is the mask? answer: 255.254.0.0 In a block, the mask is 255.255.192.0; what is the prefix length? answer: /18 In a block, the mask is 255.255.255.224; what is the prefix length? A) /20 B) /19 C) /20 answer: none of the above In _______ delivery, both the deliverer of the IP packet and the destination are on the same network. answer: a direct In _______ delivery, the deliverer of the IP packet and the destination are on d ifferent networks. answer: an indirect In _______ delivery, packets of a message are logically connected to one another . answer: a connection-oriented In _______ delivery, a packet is not connected to any other packet. answer: a connectionless In classful addressing, when a direct delivery is made, both the deliverer and r eceiver have the same _______. answer: netid In classful addressing, when an indirect delivery is made, the deliverer and rec

eiver have _______. answer: different netids In _______ forwarding, the full IP address of a destination is given in the rout ing table. answer: host-specific In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in th e routing table. answer: default In _______ forwarding, the destination address is a network address in the routi ng table. answer: network-specific In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information. answer: next-hop In ________ addressing, a typical forwarding module can be designed using three tables, one for each unicast class (A, B, C). answer: classful In classful addressing, the class of the address can be found by shifting the co py of the address ____ bits to the right. answer: 28 In classful addressing we need a routing table with at least ______ columns. answer: 3 In classless addressing, we need a routing table with at least _______ columns. answer: 4 The idea of address aggregation was designed to alleviate the increase in routin g table entries when using ________. answer: classless addressing The principle of ________ states that the routing table is sorted from the longe st mask to the shortest mask. answer: longest mask matching The use of hierarchy in routing tables can ________ the size of the routing tabl es. answer: reduce _______ deals with the issues of creating and maintaining routing tables. answer: Routing A _______ routing table contains information entered manually. answer: static A _______ routing table is updated periodically using one of the dynamic routing protocols. answer: dynamic The input and output ports of a router perform the ________ layer functions of t he router. answer: physical and data link The routing processor of a router performs the ________ layer functions of the r outer. answer: network The task of moving the packet from the input queue to the output queue in a rout er is done by _________. answer: switching fabrics A _______ address is an internetwork address with universal jurisdiction. answer: logical The logical addresses in the TCP/IP protocol suite are called _______ addresses. answer: IP A ________ is a local address. Its jurisdiction is over a local network. answer: physical If the sender is a host and wants to send a packet to another host on the same n etwork, the logical address that must be mapped to a physical address is ______. answer: the destination IP address in the datagram header If the sender is a host and wants to send a packet to another host on another ne twork, the logical address that must be mapped to a physical address is ______.

answer: the IP address of the router found in the routing table The sender is a router that has received a datagram destined for a host on anoth er network. The logical address that must be mapped to a physical address is ___ ___. answer: the IP address of the router found in the routing table The sender is a router that has received a datagram destined for a host in the s ame network. The logical address that must be mapped to a physical address is __ ____. answer: the destination IP address in the datagram header In _______, a table associating a logical address with a physical address is upd ated manually. answer: static mapping _______ is a dynamic mapping protocol in which a logical address is found for a given physical address. answer: RARP _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. answer: ARP The target hardware address on an Ethernet is _______ in an ARP request. answer: 0x000000000000 An ARP reply is normally _______. answer: unicast An ARP request is normally _______. answer: broadcast A technique called ______ is used to create a subnetting effect. answer: proxy ARP A _______ is an ARP that acts on behalf of a set of hosts. answer: proxy ARP A sender usually has more than one IP datagram to send to the same destination. It is inefficient to use the ARP protocol for each datagram destined for the sam e host or router. The solution is the _________. answer: ARP table The RARP reply packets are normally_________ . answer: unicast The ARP component that sends an ARP reply to the data link layer is the _______. answer: input module The ARP component that sends an IP packet to a queue is the _______. answer: output module The ________ protocol is the transmission mechanism used by the TCP/IP suite. answer: IP IP is _________ datagram protocol. answer: both a and b The term ________ means that IP provides no error checking or tracking. IP assum es the unreliability of the underlying layers and does its best to get a transmi ssion through to its destination, but with no guarantees. answer: best-effort delivery A best-effort delivery service such as IP includes _______. answer: none of the above An HLEN value of decimal 10 means _______. answer: there are 40 bytes in the header A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identification field is the same for all three datagrams. Which field or bit value unambiguously identifies the datagram as a fragment? answer: Fragment offset = 1000 If the fragment offset has a value of 100, it means that _______. answer: the first byte of the datagram is byte 800 What is needed to determine the number of the last byte of a fragment? answer: b and c (total length) The IP header size _______.

answer: is 20 to 60 bytes long Packets in the IP layer are called _________ . answer: datagrams The total length field defines the total length of the datagram _________. answer: including the header When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______. answer: MTU Which IP option is used if exactly four specific routers are to be visited by th e datagram? answer: strict source route For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field. answer: 0 The IP header field formerly known as the service type field is now called the _ ______ field. answer: differentiated services The _______ module takes fragments of a message and puts them back in order. answer: reassembly The _______ module sends out an IP packet, the next-hop address, and interface i nformation. answer: forwarding The _______ module discards datagrams with a TTL value of zero. answer: processing The output of the _______ module is an IP packet destined for an upper-layer pro tocol. answer: reassembly The _______ module consults the MTU table to determine the packet size necessary for transmission. answer: fragmentation The value of the ________ subfield in an option controls the presence of the opt ion in fragmentation. answer: copy The value of the ________ subfield defines the general purpose of an option. answer: class The value of the ________ subfield defines the types of an option. answer: number Only ______ end of option option can be used in a datagram. answer: one ICMP is a _________ layer protocol. answer: network ICMP messages are divided into two broad categories: answer: query and error reporting messages An ICMP message has _____ header and a variable-size data section. answer: an 8-byte Which of the following is true about ICMP messages? answer: none is true Which of the following is true about ICMP messages? answer: An ICMP error message may be generated only for the first fragment. Which of the following is true about ICMP messages? answer: No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0. If a host needs to synchronize its clock with another host, it sends a _______ m essage. answer: check node-to-node communication In error reporting the encapsulated ICMP packet goes to _______. answer: the original sender What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)? answer: type

When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent. answer: time-exceeded When all fragments of a message have not been received within the designated amo unt of time, a _______ error message is sent. answer: time-exceeded Errors in the header or option fields of an IP datagram require a _______ error message. answer: parameter-problem A _______ can learn about network _______ by sending out a router-solicitation p acket. answer: host, routers Who can send ICMP error-reporting messages? answer: a and b ( routers & destination hosts) One method to alert a source host of congestion is the _______ message. answer: source-quench A time-exceeded message is generated if _______. answer: a and b (the round-trip time between hosts is close to zero & fragments of a message do not arrive within a set time) To determine whether or not a node is reachable, _______ message can be sent. answer: an echo-request In calculating the time difference between two clocks, a negative value indicate s _______. answer: the destination clock lags behind the source clock An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encap sulates the ICMP packet contains _______. answer: the ICMP header plus 8 bytes of datagram A In the ICMP package, ICMP packets are the output of _______. answer: both the input and the output module ICMP packets are the input to _______. answer: only the input module IGMP is a companion to the ______ protocol. A) UDP B) TCP C) ICM answer: none of the above IGMP is _______ protocol. answer: a group management IGMP helps a ________ router create and update a list of loyal members related t o each router interface. answer: multicast IGMP operates __________. answer: locally An IGMP query is sent from a _______ to a _______. answer: router; host or router The _______ is used by a router in response to a received leave report. answer: special query message The least significant 23 bits in a 48-bit Ethernet address identify a ________. answer: multicast group The _______ field of the IGMP message is all zeros in a query message. answer: group address The _______ field of the IGMP message is 17 for a query message. answer: type A multicast message is sent from _______ to _______. answer: one source; multiple destinations In networks that do not support physical multicast addressing, multicasting can be accomplished through _______. answer: tunneling If four hosts on a network belong to the same group, a total of _______ sent in response to a general query message. answer: two membership reports are A process called _______ sends a multicast packet through WANs that do not suppo

rt physical multicast addressing. answer: tunneling A group table entry is in the _______ state if there is no corresponding timer r unning. answer: IDLE A group table entry in the _______ state sends a request when its timer expires. answer: DELAYING The _______ module receives an IGMP report or query. answer: input The _______ module sends out an IGMP report. answer: output The _______ module can create a new entry in the group table and start a timer. answer: group-joining The _______ module can decrement the reference count in the group table. answer: group-leaving In IGMP, a membership report is sent _______. answer: twice In IGMP, the general query message ___________________ group. answer: does not define a particular To prevent unnecessary traffic, IGMP uses ______________ strategy. answer: a delayed response To prevent unnecessary traffic, IGMP designates one router as the __________ for each network. answer: query router An IGMP packet is carried in an __________ packet. answer: IP The IP packet that carries an IGMP packet has a value of _______ in its protocol field. answer: 2 One of the responsibilities of the transport layer protocol is to create a _____ _ communication. answer: process-to-process UDP is called a ________________transport protocol. answer: connectionless, unreliable UDP does not add anything to the services of IP except for providing _______ com munication. answer: process-to-process UDP is an acronym for _______. answer: User Datagram Protocol Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm. answer: client-server The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ . answer: port addresses The ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These ar e the ___________ ports. answer: well-known The ports ranging from 1,024 to 49,151 are not assigned or controlled by ICANN. They are called ___________ ports. answer: registered The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports. answer: dynamic In the sending computer, UDP receives a data unit from the _______ layer. answer: application In the sending computer, UDP sends a data unit to the _______ layer. answer: IP UDP and TCP are both _______ layer protocols. answer: transport

Which of the following functions does UDP perform? answer: process-to-process communication When the IP layer of a receiving host receives a datagram, _______. answer: a transport layer protocol takes over UDP needs the _______ address to deliver the user datagram to the correct applic ation process. answer: port A port address in UDP is _______ long. answer: 16 Which of the following does UDP guarantee? A) flow control B) connection-orien ted delivery C) flow control answer: none of the above The source port address on the UDP user datagram header defines _______. answer: the process running on the sending computer The combination of an IP address and a port number is called a ____________. answer: socket address To use the services of UDP, we need ________ socket addresses. answer: two UDP packets are called __________ . answer: user datagrams UDP packets have a fixed-size header of _______ bytes. answer: 8 UDP packets are encapsulated in ___________ . answer: an IP datagram UDP uses ________ to handle outgoing user datagrams from multiple processes on o ne host. answer: multiplexing UDP uses _______ to handle incoming user datagrams that go to different processe s on the same host. answer: demultiplexing TCP is a __________protocol. answer: stream-oriented TCP allows the sending process to deliver data as a _______of bytes and allows t he receiving process to obtain data as a _________ of bytes.. answer: stream; stream Because the sending and the receiving processes may not write or read data at th e same speed, TCP ________. answer: uses buffers TCP groups a number of bytes together into a packet called a ___________. answer: segment TCP is a ___________ protocol.. answer: connection-oriented TCP is a(n) _______ transport protocol. answer: reliable TCP uses _________________ to check the safe and sound arrival of data. answer: an acknowledgment mechanism The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________. answer: randomly generated number TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . answer: first Communication in TCP is ___________. answer: full-duplex The value of the acknowledgment field in a segment defines the number of the ___ ___byte a party expects to receive. answer: next The acknowledgment number is ________. answer: cumulative

The value of window size is determined by _________. answer: the receiver The inclusion of the checksum in the TCP segment is ________. answer: mandatory A TCP segment is encapsulated in __________. answer: an IP datagram Connection establishment in TCP is called __________ handshaking. A) two-way B) four-way C) one-way answer: none of the above A SYN segment cannot carry data; it consumes _____ sequence number(s). answer: one A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers. A) no B) three C) two answer: none of the above An ACK segment, if carrying no data, consumes ______ sequence number(s). answer: no The connection establishment procedure in TCP is susceptible to a serious securi ty problem called the _________ attack. answer: SYN flooding The SYN flooding attack belongs to a group of security attacks known as a _____ attack. answer: denial of service The FIN segment consumes ____ sequence numbers if it does not carry data. A) two B) three C) no answer: none of the above The FIN + ACK segment consumes _____ sequence number(s) if it does not carry dat a. answer: one In TCP, one end can stop sending data while still receiving data. This is called a ______ . answer: half-close A(n) _________ machine is a machine that goes through a limited number of states . answer: finite state A common value for MSL is between___ seconds and ___ minute(s). answer: 30; 1 __________ control regulates the amount of data a source can send before receivi ng an acknowledgment from the destination.. answer: Flow To accomplish flow control, TCP uses a ___________ window protocol. answer: sliding TCP sliding windows are __________ oriented. answer: byte In TCP, the size of the window is the ________ of rwnd and cwnd. answer: minimum In TCP, the window should not be _________. answer: shrunk In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down. answer: one A serious problem can arise in the sliding window operation when either the send ing application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______. answer: silly window syndrome Nagle's algorithm can solve the silly window syndrome created by the _________. answer: sender Clark's solution can solve the silly window syndrome created by the _________. answer: receiver Delayed acknowledgment can solve the silly window syndrome created by the ______ ___.

answer: receiver ACK segments consume _______ sequence number(s) and _______ acknowledged. answer: no; are not In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived. answer: three In TCP, ________ retransmission timer is set for an ACK segment. answer: no TCP delivers _______ out-of-order segments to the process. answer: no Lost acknowledgments may create a _______ if they are not handled properly. answer: deadlock In the ________ algorithm the size of the congestion window increases exponentia lly until it reaches a threshold. answer: slow start In the __________ algorithm the size of the congestion window increases additive ly until congestion is detected. answer: congestion avoidance In the congestion detection algorithm, if detection is by a time-out, a new ____ ___ phase starts. answer: slow start In the congestion detection algorithm, if detection is by three ACKs, a new ____ ___ phase starts. answer: congestion avoidance In TCP, there can be ______ RTT measurement(s) in progress at any time. answer: only one The value of the window scale factor can be determined during __________. answer: connection establishment IP is responsible for _______ communication while TCP is responsible for _______ communication. answer: host-to-host; process-to-process If a segment carries data along with an acknowledgment, this is called _______. answer: piggybacking Multiply the header length field by _______ to find the total number of bytes in the TCP header. answer: 4 Urgent data requires the urgent pointer field as well as the URG bit in the ____ ___ field. answer: control Which of the following is not a valid acknowledgment number? answer: 232 The options field of the TCP header ranges from 0 to _______ bytes. answer: 40 Which option defines the maximum number of bytes in a TCP segment? answer: maximum segment size If the ACK value is 200, then byte _______ has been received successfully. answer: 199 The _______ timer prevents a long idle connection between two TCPs. answer: keepalive The _______ timer is needed to handle the zero window-size advertisement. answer: persistence Karn's algorithm is used in calculations by the _______ timer. answer: retransmission In the _______ state, the client TCP has closed its connection to the server. answer: FIN-WAIT-2 A special segment called a probe is sent by a sending TCP when the _______ timer goes off. answer: persistence Stream Control Transmission Protocol (SCTP) is a new _____________protocol. answer: reliable, message-oriented

SCTP allows __________ service in each association. answer: multistream SCTP association allows _____________ for each end. answer: multiple IP addresses In SCTP, a data chunk is numbered using ________. answer: a TSN To distinguish between different streams, SCTP uses ___________. answer: an SI To distinguish between different data chunks belonging to the same stream, SCTP uses ___________. answer: SSNs TCP has ____________; SCTP has ____________. answer: segments; packets The control information in SCTP is included in the ________. answer: control chunks An SCTP packet can carry __________. answer: several data chunks Options in SCTP ____________________________. answer: are handled by defining new chunk types The general header in SCTP is _______ bytes. answer: 12 An SCTP sequence number (TSN) is located in the _______. answer: data chunk header In SCTP, the acknowledgment number and window size are part of each ________. answer: control chunk There is no need for a header length field in SCTP because ________________. answer: both a and b (there are no options in the general header & the size of t he header is fixed) The checksum in SCTP is ________ bits. answer: 32 The association identifier in SCTP is __________________ . answer: a unique verification tag The association identifier in SCTP cannot be a combination of logical and port a ddresses because of ________________. answer: multihoming service In SCTP, control information and data information are carried in _______ chunks. answer: different chunks Control chunks in SCTP ___________________. answer: never use a TSN, IS, or SSN number In SCTP, TSN is a cumulative number identifying the _______; SI defines the ____ ___; SSN defines the ________. answer: association; stream; chunks in a stream In SCTP, acknowledgment numbers are used to acknowledge _____________. answer: only data chunks In an SCTP packet, control chunks come ___________ data chunks. answer: before In SCTP, chunks need to terminate on a _______boundary. answer: 32-bit In SCTP, the number of padding bytes are _________ in the value of the length fi eld. answer: not included In SCTP, a DATA chunk ______carry data belonging to more than one message. answer: cannot In SCTP, a message ________ split into several chunks. answer: can be In SCTP, the data field of the DATA chunk must carry at least _________ byte of data, which means the value of length field cannot be less than ___________. answer: 1; 17 In SCTP, ___________ can be carried in a packet that carries an INIT chunk. answer: no other chunk

A connection in SCTP is called an ____________. answer: association The acknowledgment in SCTP defines the cumulative TSN, the TSN of the __________ __ . answer: last data chunk received in order A DATA chunk arrives with its B/E bits equal to 00. It is ___________. answer: the middle fragment A DATA chunk arrives with its B/E bits equal to 01. It is ___________. answer: the last fragment A DATA chunk arrives with its B/E bits equal to 10. It is ___________. answer: the first fragment A DATA chunk arrives with its B/E bits equal to 11. It is ___________. answer: not fragmented The number of states in the state transition diagram of SCTP is __________ the n umber of states in the state transition diagram of TCP. answer: less than Which chunk is not involved in association establishment? answer: SACK chunk Which chunk probes the condition of an association? answer: HEARTBEAT chunk The _______ chunk is sent when an end point finds an error in a received packet. answer: ERROR In SCTP, duplicate messages are _______. answer: b and c (tracked) SCTP strategies for congestion control include _______. A) exponent ial increase B) additive increase C) multiplicative decrease answer: all of the above We can divide audio and video services into _______ broad categories. answer: three ________ audio/video refers to on-demand requests for compressed audio/video fil es. answer: Streaming stored ___________ audio/video refers to the broadcasting of radio and TV programs thro ugh the Internet. answer: Streaming live _________ audio/video refers to the use of the Internet for interactive audio/vi deo applications. answer: Interactive According to the Nyquist theorem, we need to sample an analog signal ________tim es the highest frequency. answer: two In ________ encoding, the differences between the samples are encoded instead of encoding all the sampled values. answer: predictive __________ encoding is based on the science of psychoacoustics, which is the stu dy of how people perceive sound. answer: Perceptual ____________ is used to compress images. answer: JPEG ____________ is used to compress video. answer: MPEG The first phase of JPEG is ___________. answer: DCT transformation The second phase of JPEG is ___________. answer: quantization The third phase of JPEG is ___________. answer: data compression Jitter is introduced in real-time data by the _______________. answer: delay between packets To prevent _________, we can timestamp the packets and separate the arrival time

from the playback time. answer: jitter A ________buffer is required for real-time traffic. answer: playback A __________on each packet is required for real-time traffic. answer: both a and b (timestamp $ sequence number) Real-time traffic needs the support of ____________. answer: multicasting __________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network. answer: Translation __________ means combining several streams of traffic into one stream. answer: Mixing _________ is not suitable for interactive multimedia traffic because it retransm its packets in case of errors. answer: TCP __________ is the protocol designed to handle real-time traffic on the Internet. answer: RTP RTP uses a temporary even-numbered _______ port. answer: UDP ___________ is a protocol for controlling the flow and quality of data. answer: RTCP RTCP uses an odd-numbered _______ port number that follows the port number selec ted for RTP. answer: UDP ___________ is an application protocol that establishes, manages, and terminates a multimedia session answer: SIP _______ is a standard to allow telephones on the public telephone network to tal k to computers connected to the Internet. answer: H.323 A real-time video performance lasts 10 min. If there is jitter in the system, th e viewer spends _______ minutes watching the performance. answer: more than 10 A _______ shows the time a packet was produced relative to the first or previous packet. answer: timestamp _______ are used to number the packets of a real-time transmission. answer: Sequence numbers In a real-time video conference, data from the server is _______ to the client s ites. answer: multicast A _______ adds signals from different sources to create a single signal. answer: mixer A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal. answer: translator An RTP packet is encapsulated in _______. answer: a UDP user datagram When there is more than one source, the _______ identifier defines the mixer. answer: synchronization source Private networks, hybrid networks, and virtual private networks can provide ____ _____ for organizations answer: privacy Both private and hybrid networks have a major drawback: _________. answer: cost A _______ network allows an organization to have its own private internet and, a t the same time, access the global Internet. answer: hybrid When an organization uses a private network, it _______________.

answer: can use a block of addresses without permission from the Internet author ities VPN is a network that is _______ but ________. answer: private; virtual A VPN is physically ________ but virtually ________. answer: public; private VPN technology uses two simultaneous techniques to guarantee privacy for an orga nization: ________ and ___________. answer: IPSec; tunneling ____________ means that each IP datagram destined for private use in the organiz ation must be encapsulated in another datagram. answer: Tunneling __________ technology allows a site to use a set of private addresses for intern al communication and a set of global Internet addresses for communication with a nother site. answer: NAT Using _______, all of the outgoing packets go through the corresponding router, which replaces the source address in the packet with the appropriate global addr ess. answer: NAT An _______ is a private network with no external access that uses the TCP/IP pro tocol suite. answer: intranet An _______ is a private network with limited external access that uses the TCP/I P protocol suite. answer: extranet A _______ network is totally isolated from the global Internet. answer: private A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. answer: hybrid A VPN can use _______ to guarantee privacy. answer: both a and b (IPSec & tunneling) Tunneling is a technique in which the IP datagram is first _______ and then ____ ___. answer: encrypted; encapsulated in another datagram _______ is a technology using a set of global Internet addresses and a set of pr ivate addresses. answer: NAT On a network that uses NAT, the _______ has a translation table. answer: router On a network that uses NAT, _______ initiates the communication. answer: an internal host On a network that uses NAT, the router can use _______ global address(es). answer: a pool of An IPv6 address is _________ bits long. answer: 128 In IPv6, options are inserted between the _________ and the ___________ data. answer: base header; upper-layer data IPv6 allows _________ security provisions than IPv4. answer: more An IPv6 address consists of ________ bytes (octets); answer: 16 To make addresses more readable, IPv6 specifies ____________notation. answer: hexadecimal colon In hexadecimal colon notation, a 128-bit address is divided into _______ section s, each _____ hexadecimal digits in length. answer: 8: 4 An IPv6 address can have up to __________ colons. answer: 7

An IPv6 address can have up to __________ hexadecimal digits. answer: 32 If an IPv6 address has digits of ________, we can abbreviate the address. answer: 0s In IPv6, _______ address defines a single computer. answer: a unicast In IPv6, ____ address defines a group of computers with addresses that have the same prefix. answer: an anycast _________ address defines a group of computers. answer: A multicast In IPv6, the ________ prefix defines the purpose of the address. answer: type In IPv6, the___________ address is generally used by a normal host as a unicast address. answer: provider-based unicast A _________ address comprises 80 bits of zero, followed by 16 bits of one, follo wed by the 32-bit IPv4 address. answer: mapped A ___________ address is an address of 96 bits of zero followed by 32 bits of IP v4 address. A) link local B) site local C) mapped answer: none of the above A _______ address is used if a LAN uses the Internet protocols but is not connec ted to the Internet for security reasons. answer: link local The ______ address is used if a site with several networks uses the Internet pro tocols but is not connected to the Internet for security reasons. answer: site local Which of the following is a necessary part of the IPv6 datagram? answer: a and b (base header & data packet from the upper layer) The _______ field in the base header restricts the lifetime of a datagram. answer: hop limit When a datagram needs to be discarded in a congested network, the decision is ba sed on the _______ field in the base header. answer: priority The _______ field in the base header and the sender IP address combine to indica te a unique path identifier for a specific flow of data. answer: flow label In the _______ extension header, the destination address changes from router to router. answer: source routing To request the physical address of a host whose IP address is known, a _______ m essage is sent. answer: neighbor-solicitation If a host needs information about routers on the network, it sends a _______ mes sage. answer: router-solicitation The ARP function in version 4 is part of _______ in version 6. answer: neighbor solicitation and advertisement The IGMP functions in version 4 are part of _______ in version 6. answer: group membership To join a group, a host sends a _______. answer: group-membership report The purpose of echo request and echo reply is to _______. answer: check node-to-node communication A router sends a _______ message to the host to monitor group membership. answer: query In error reporting the encapsulated ICMP packet goes to _______. answer: the source In error reporting, a destination can send a _______ message if an option is not

recognized. answer: parameter-problem An MTU field is found on the _______ error message to inform the sender about pa cket size. answer: none of the above When all fragments of a message have not been received within the designated amo unt of time, a _______ error message is sent. answer: time-exceeded When the hop count field reaches zero and the destination has not been reached, a _______ error message is sent. answer: time-exceeded Errors in the header or option fields of an IP datagram require a _______ error message. answer: parameter-problem If a member of a group wishes to terminate membership, it can _______ in respons e to a group membership query. answer: send a group membership termination In version 6, an independent protocol called _______ is eliminated. answer: IGMP The _______ packet contains information about a router. answer: router advertisement When a host has the _______ address of a host but needs the _______ address, it uses a neighbor solicitation packet. answer: IP; physical A router can send a _______ message to a host to inform it of a more efficient p ath. answer: redirection Which version 4 protocols are still viable and known by their same names in vers ion 6? A) IGMP B) ARP C) RARP answer: none of the above Which error-reporting message from version 4 has been eliminated in version 6? answer: source quench Which error-reporting message is found in version 6 but not in version 4? answer: packet too big In cryptography, the encryption/decryption algorithms are ________; the keys are ________. answer: public; secret In __________cryptography, the same key is used by the sender (for encryption) a nd the receiver (for decryption). answer: symmetric-key In _________ cryptography, the same key is used in both directions. answer: symmetric-key The DES cipher uses the same concept as the _________ cipher, but the encryption / decryption algorithm is much more complex. answer: Caesar _________ cryptography is often used for long messages. answer: Symmetric-key ___________ algorithms are more efficient for short messages. answer: Asymmetric-key __________means that the sender and the receiver expect confidentiality. answer: none of the above ___________ means that the data must arrive at the receiver exactly as they were sent. answer: Message integrity ______________ means that the receiver needs to be sure of the sender identity a nd that an imposter has not sent the message. answer: Message authentication ______________ can provide authentication, integrity, and nonrepudiation for a m essage. answer: Digital signature

Digital signature does not provide _________. answer: privacy In ___________, the entity identity is verified once for the entire duration of system access. answer: entity authentication The symmetric (shared) key in the Diffie-Hellman protocol is ____________. answer: K = Gxy mod N In __________ cryptography, everyone has access to everyones public key. answer: asymmetric-key ___________servers are involved in the Kerberos protocol. answer: Three In Kerberos, the _______ is the KDC. answer: AS In Kerberos, the _______ issues the ticket for the real server. answer: TGS In Kerberos, the ___________ provides services for the entity. answer: real server Kerberos allows the global distribution of ASs and TGSs, with each system called a ________ answer: realm IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level. answer: network IPSec requires a logical connection between two hosts using a signaling protocol called ____________. answer: SA IPSec operates at two different modes: _________ mode and _________mode. answer: transport; tunnel In the _________ mode, the IPSec header is added between the IP header and the r est of the packet. answer: transport In the ________ mode, the IPSec header is placed in front of the original IP hea der. answer: tunnel IPSec defines two protocols: _________ and __________. A) AH: SSP B) ESP; SSP C) AH: EH answer: none of the above The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet. answer: AH The _______ protocol provides message authentication and integrity, but not priv acy. answer: AH The _______ protocol provides message authentication, integrity, and privacy. answer: ESP The _______ was designed to provide security at the transport layer. answer: TLS _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email. A) AH B) ESP C) TLS answer: none of the above A packet-filter firewall filters at the ________ or ___________ layer. answer: network; transport A proxy firewall filters at the __________ layer. answer: application Before a message is encrypted, it is called _______. answer: plaintext After a message is encrypted, it is called _______. answer: ciphertext If 20 people need to communicate using symmetric-key cryptography, _______ symme tric keys are needed.

answer: 190 In the asymmetric-key method of cryptography, which key is publicly known? answer: encryption key only In the asymmetric-key method of cryptography, the receiver has possession of the _______. answer: private key The RSA algorithm uses _______ cryptography method. answer: an asymmetric-key If user A wants to send an encrypted message to user B, the plaintext is encrypt ed with the public key of _______. answer: user B In the digital signature technique when the whole message is signed using an asy mmetric key, the sender of the message uses _______ to sign the message. answer: his or her own private key In the digital signature technique when the whole message is signed using an asy mmetric key, the receiver of the message uses _______ to verify the signature. answer: the senders public key A _______ is a trusted third party that solves the problem of symmetric-key dist ribution. answer: KDC A _______ certifies the binding between a public key and its owner. answer: CA In a _______ attack, a message captured by an intruder is illegally sent a secon d time. answer: replay A _______ is a large number used only once that helps distinguish a fresh authen tication request from a repeated one. answer: nonce In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are p ublic numbers. answer: Diffie-Hellman In a _______ attack, an intruder comes between two communicating parties, interc epting and replying to their messages. answer: man-in-the-middle _______ is an authentication protocol that needs an authentication server and a ticket-granting server. answer: Kerberos static table is one _______. Answer: with manual entries A dynamic table is one _______. Answer: which is updated automatically For purposes of routing, the Internet is divided into ___________. Answer: autonomous systems ____________ is a group of networks and routers under the authority of a single administration. Answer: An autonomous system Routing inside an autonomous system is referred to as _______________. Answer:intradomain routing Routing between autonomous systems is referred to as ____________. Answer: interdomain routing In _______ routing, the least cost route between any two nodes is the route with the minimum distance. Answer: distance vector In ________, each node maintains a vector (table) of minimum distances to every node. Answer: distance vector In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change. Answer: its immediate neighbors The Routing Information Protocol (RIP) is an intradomain routing based on ______

___ routing. Answer: distance vector The metric used by _______ is the hop count. Answer:RIP In RIP, the ________ timer controls the advertising of regular update messages. Answer:periodic In RIP, the ________ timer is used to purge invalid routes from the table. Answer:garbage collection In RIP, the ________ timer controls the validity of the route. Answer:expiration RIP uses the services of _______. Answer:UDP The _________ routing uses the Dijkstra algorithm to build a routing table. Answer:link state The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing. Answer:link state The _______ protocol allows the administrator to assign a cost, called the metri c, to each route. Answer:OSPF In OSPF, a ________ link connects two routers without any other host or router i n between. Answer: point-to-point In OSPF, a _______ link is a network with several routers attached to it. Answer:transient In OSPF, a ________ link is a network is connected to only one router. In OSPF, when the link between two routers is broken, the administration may cre ate a _________ link between them using a longer path that probably goes through several routers. Answer:none of the above In OSPF, a ________ defines the links of a true router. Answer:router link In OSPF, a ________ defines the links of a network. Answer:network link In OSPF, an area border router advertises a ____________ LSA. Answer:summary link to network OSPF uses the _______ message to create neighborhood relationships and to test t he reachability of neighbors. Answer:none of the above In OSPF, the ________ message does not contain complete database information; it only gives an outline, the title of each line in the database. Answer:database description In OSPF, a _________ message is sent by a router that needs information about a specific route or routes. Answer:link state request In ________ routing, we assume that there is one node (or more) in each autonomo us system that acts on behalf of the entire autonomous system. Answer:path vector ___________ is an interdomain routing protocol using path vector routing. Answer:BGP BGP can have two types of sessions: _______ and ________ sessions. Answer:E-BGP; I-BGP To create a neighborhood relationship, a router running BGP sends an ________ me ssage. Answer:open In BGP, the _______ message is used by a router to withdraw destinations that ha ve been advertised previously, or to announce a route to a new destination, or b oth. Answer:keepalive The routers running the BGP protocols exchange _______ messages regularly to tel

l each other that they are alive. Answer:keepalive In BGP, a _______ message is sent by a router whenever an error condition is det ected or a router wants to close the connection. Answer:none of the above BGP messages are encapsulated in _______. Answer:TCP segments An area is _______. Answer:part of an AS A one-to-all communication between one source and all hosts on a network is clas sified as a _______ communication. Answer:broadcast A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication. Answer:multicast A one-to-one communication between one source and one destination is classified as a _______ communication. Answer: none of the above In ______, the router forwards the received packet through only one of its inter faces. Answer:unicasting In _______, the router may forward the received packet through several of its in terfaces. Answer:multicasting Emulation of ________ through ___________ is not efficient and may create long d elays. Answer:multicasting; multiple unicasting In unicast routing, each router in the domain has a table that defines a ______ path tree to possible destinations. Answer:shortest In multicast routing, each involved router needs to construct a ________ path tr ee for each group. Answer:shortest In the _______ tree approach, each router needs to have one shortest path tree f or each group. Answer: source-based In the group-shared tree approach, _________ involved in multicasting. Answer:only the core router is Multicast link state routing uses the _______ tree approach. Answer: source-based The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the O SPF protocol that uses multicast routing to create source-based trees. The proto col is based on _______ routing. Answer:link state MOSPF is a _______ protocol. Answer:data-driven _________ broadcasts packets, but creates loops in the systems. Answer:Flooding In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router. Answer:shortest RPF eliminates the ________ in the flooding process. Answer: none of the above RPF guarantees that each network receives only ____ of the multicast packet. Answer:none of the above RPB creates a shortest path _______ tree from the source to each destination. Answer:broadcast RPB guarantees that each destination receives _________ of the packet. Answer:one copy In ________, the multicast packet must reach only those networks that have activ

e members for that particular group. Answer:RPM ______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes. Answer:RPM; RPB __________ is an implementation of multicast distance vector routing. It is a so urce-based routing protocol, based on RIP. Answer:DVMRP DVMRP is a ________routing protocol, based on RIP. Answer:source-based Pruning and grafting are strategies used in _______. Answer:RPM A _______ message tells an upstream router to stop sending multicast messages fo r a specific group through a specific router. Answer:prune A _______ message tells an upstream router to start sending multicast messages f or a specific group through a specific router. Answer:graft CBT is a ________ protocol that uses a core as the root of the tree. Answer:group-shared PIM-DM is used in a _______ multicast environment, such as a LAN. Answer: dense PIM-SM is used in a _______multicast environment such as a WAN. Answer:sparse In _______, a logical tunnel is established by encapsulating the multicast packe t inside a unicast packet. Answer:MBONE The Bootstrap Protocol (BOOTP) is a client/server protocol designed to provide ________ of information for a diskless computer or a computer that is booted for the first time. Answer:four pieces The BOOTP client and server can be on _______. Answer:both a and b If BOOTP client and server are on different networks, there is a need for an in termediary called a _______. Answer:relay agent In BOOTP, the client uses ________ port and the server uses _________port. Answer:a well-known; a well-known In BOOTP, the server uses the well-known port _______; the client uses the well -known port _______. Answer:67; 68 In BOOTP, the client often needs to use ________ to obtain the complete informat ion it needs. Answer:TFTP BOOTP uses the services of _______. Answer:UDP BOOTP is a ________ configuration protocol. Answer:static DHCP is a _______ configuration protocol. Answer:both a and b DHCP can be configured ___________. Answer:manually / automatically DHCP client can be in one of ___________ states. Answer:6 When the DHCP client first starts, it is in the _______ state. Answer:initializing After sending the DHCPDISCOVER message, the client goes to the _______ state. Answer:selecting The default lease time of an IP address offer is ________. Answer:1 hour

After sending the DHCPDISCOVER message, the client goes to the _______ state. Answer:selecting _______ is backward compatible with __________. Answer:DHCP; BOOTP After the selecting state, a DHCP client can go to the ________state. Answer:requesting After the rebinding state, a DHCP client can go to the __________ state. Answer:initializing / bound After the bound state, a DHCP client can go to the __________ state. Answer:renewing After the renewing state, a DHCP client can go to the __________ state. Answer:rebinding In a _______ name space, a name is assigned to an address. A name in this space is a sequence of characters without structure. Answer: flat In a _________name space, each name is made of several parts. Answer:hierarchical To have a hierarchical name space, a ______________ was designed. Answer: domain name space In the DNS, the names are defined in ___________ structure. Answer:an inverted-tree Each node in the tree has a _______, which is a string with a maximum of ___ ch aracters. Answer:label; 63 The root of the DNS tree is _______. Answer: an empty string A full domain name is a sequence of labels separated by ________. Answer: dots If a label is terminated by a null string, it is called a __________. Answer: FQDN If a label is not terminated by a null string, it is called a __________. Answer: PQDN A _________ is a subtree of the domain name space. Answer: domain What a server is responsible for or has authority over is called a _________. Answer: zone A _______ is a server whose zone consists of the whole tree. Answer: root server A ________ server loads all information from the disk file. Answer: primary A ________ server loads all information from the primary server. Answer: secondary When the secondary downloads information from the primary, it is called ______ t ransfer. Answer: zone In the Internet, the domain name space (tree) is divided into _______ different sections: Answer: three The _______ domains define registered hosts according to their generic behavior. Answer: generic The first level in the generic domains section allows ______ possible labels. Answer: none of the above The ____________ domain section uses two-character country abbreviations. Answer:country The _________ domain is used to map an address to a name. Answer: inverse In __________ resolution, the resolver expects the server to supply the final an swer. Answer:recursive

In __________ resolution, the server returns the IP address of the server that i t thinks can resolve the query. Answer:iterative In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: edu In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer:chal A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DN S hierarchical tree. (The root is level one.) Answer: fifth A pointer query involves the _______ domain. Answer:inverse DNS can use the services of ________ using the well-known port 53. Answer: UDP / TCP TELNET is an abbreviation for ____________. Answer:terminal network is a ________ client-server application program. Answer:general-purpose When a user logs into a local time-sharing system, it is called ________ login. Answer:local When a user wants to access an application program or utility located on a remot e machine, he or she performs ___________ login. Answer:remote NVT uses two sets of characters, one for _____and one for __________. Answer:data; control For data, NVT uses US ASCII characters with the highest order bit set to ______. Answer:0 For control, NVT uses US ASCII characters with the highest order bit set to ___ ___. Answer:1 TELNET uses only one TCP connection. The server uses ________ port and the clien t uses ________ port. Answer:a well-known; an ephemeral To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________. Answer:IAC To make control characters effective in special situations, TELNET uses ______ s ignaling. Answer:out-of-band In the _______ mode, the echoing is done by the client. Answer:default In the _______ mode, each character typed is sent by the client to the server. Answer:characte In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client. Answer:line The _______ is software residing on the remote system that allows the remote sys tem to receive characters from a TELNET server. Answer: pseudoterminal driver The _______ translates local characters into NVT form. Answer:TELNET client The _______ translates NVT characters into a form acceptable by the remote opera ting system. Answer:TELNET server If the sender wants to disable an option, it sends a _______ command. Answer:WONT If the sender wants to enable an option, it sends a _______ command. Answer:WIL If the sender wants an option disabled by the receiver, it sends a _______ comma

nd. Answer:DONT If the sender wants an option enabled by the receiver, it sends a _______ comman d. Answer:DO _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another. Answer:none of the above FTP uses the services of ________. Answer:TCP In FTP, the well-known port ____ is used for the control connection and the wel l-known port ________ for the data connection. Answer:21; 20 In FTP, _______ is the service type used by the IP protocol because this is an i nteractive connection between a user (human) and a server. Answer:minimize delay For control connection, FTP uses the __________ character set Answer:NVT ASCII During an FTP session the control connection is opened _______. Answer:exactly once During an FTP session the data connection is opened _______. Answer:as many times as necessary In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. Answer:data structures In FTP, there are three types of _______: stream, block, and compressed. Answer:transmission modes In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer:file type In FTP, which category of commands is used to store and retrieve files? Answer:file transfer commands In FTP, which category of commands defines the port number for the data connecti on on the client site? Answer:port defining commands In FTP, which category of commands sets the attributes (file type, data structur e, and transmission modes) of a file to be transferred? Answer:data formatting commands In FTP, which category of commands lets a user switch directories and create or delete directories? Answer: file management commands In FTP, when we _______, it is copied from the server to the client. Answer: retrieve a file / retrieve a list In FTP, when we _______, it is copied from the client to the server. Answer: store a file TFTP uses the services of ________. Answer: UDP In TFTP, what type of message is sent in response to an RRQ that fails to establ ish a connection? Answer: ERROR In TFTP, what type of message is sent to establish a connection to retrieve a fi le? Answer: RRQ In TFTP, which type of message is always a set number of bytes? Answer:ACK In TFTP, A DATA block is sent in response to a _______ message. Answer:RRQ / ACK In TFTP, a connection is terminated with a _______ block. Answer:DATA An unauthorized user tries to send a file to a server using TFTP. What should be the response of the server?

Answer:ERROR In TFTP, the block number on a DATA message is 22. This always means _______. Answer:there were 21 previous blocks Which TFTP message contains a block number field? Answer: DATA / ACK In TFTP, connection termination is signaled by a DATA message with _______ bytes . Answer: 0 to 511 The flow-control mechanism in TFTP _______. Answer: requires an ACK for every DATA message In TFTP, if a message is _______, it is resent. Answer: damaged / lost In TFTP, if a duplicate DATA message is received, _______. Answer:the receiver discards the duplicate In TFTP, one symptom of the sorcerers apprentice bug is that _______. Answer:ACKS are duplicated / DATA messages are duplicated A ________ is part of a local hard drive, a special file with permission restric tions. Answer:none of the above When the sender and the receiver of an email are on different systems, we need o nly _____________. Answer:two UAs and one pair of MTAs When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________. Answer: two UAs, two pairs of MTAs, and a pair of MAAs ________ provides service to the user to make the process of sending and receiv ing a message easier. Answer: A UA Which of the following services is not provided by a UA? Answer: all are There are two types of user agents: _________ and ___________. Answer: command-driven and GUI-based The ________ usually contains the sender address, the receiver address, and ot her information. Answer: envelope The message contains the ________ and the __________. Answer: header; body In the Internet, the email address consists of two parts: a _______ and a _____ __. Answer: local part; domain name _________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: MIME The actual mail transfer is done through ____________. Answer: MTAs The formal protocol that defines the MTA client and server in the Internet is c alled ___________. Answer: SMTP The process of transferring a mail message occurs in ________ phases. Answer: none of the above SMTP is a __________protocol. Answer: push The third stage in an email transfer needs a ________ protocol. Answer: pull The third stage in an email transfer uses a(n) ________ protocol. Answer: MAA Currently two message access protocols are available: _______ and _________. Answer: POP3; IMAP4 Which part of the mail created by the UA contains the sender and receiver names ?

Answer: header In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits. Answer: base64 In the _______ encoding scheme, a non-ASCII character is sent as 3 characters. Answer: quoted-printable This command identifies the recipient of the mail. Answer: RCPT TO This command identifies the sender of the message. Answer: MAIL FROM The MIME _______ header uses text to describe the type of data in the body of t he message. Answer: content-description _______ is more powerful and complex than _______. Answer:IMAP4; POP3 SNMP defines the ___________________ to be sent from a manager to an agent and v ice versa. Answer:format of the packets A manager is a host that runs the SNMP _______ process. Answer:client An agent is a host or computer that runs the SNMP _______ process. Answer: server SNMP uses two other protocols:________ and _________. Answer: SMI; MIB ________ defines the general rules for naming objects, defining object types, a nd showing how to encode objects and values. Answer: SMI __________ creates a collection of named objects, their types, and their relat ionships to each other in an entity to be managed. Answer: SMI We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________. Answer: SMI We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________. Answer: MIB We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is h andled by _______. Answer: SMNP SMI emphasizes three attributes to handle an object: _____, ________, and _____ ____. Answer: name; data type; encoding method To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure Answer: tree All objects managed by SNMP are given an object identifier. The object identifie r always starts with _______. Answer:1.3.6.1.2.1 To define the data type, SMI uses fundamental _______ definitions and adds some new definitions. Answer:ASN.1 SMI has two broad categories of data type: _______ and _______. Answer: simple; structured The _______ data types are atomic data types. Answer: simple SMI defines two structured data types: ________ and _________. Answer: sequence; a sequence o SMI uses another standard, ___________, to encode data to be transmitted over th

e network. Answer: BER The _________ ordering enables a manager to access a set of variables one after another by defining the first variable. Answer: lexicographic The GetRequest PDU is sent from the _______ to the __________ to retrieve the va lue of a variable or a set of variables. Answer: client; server The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest. Answer: server; client The Trap PDU is sent from the ______ to the _______ to report an event. Answer: server; client SNMP uses the services of UDP on two well-known ports, _______ and _______. Answer: 161; 162 _______ runs the SNMP client program; _______ runs the SNMP server program. Answer: manager; an agent INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI. Answer:ASN.1 Which of the following could be a legitimate MIB object identifier? Answer: 1.3.6.1.2.1.1 Which is a manager duty? Answer: Retrieve the value of an object defined in an agent. / Store the value of an object defined in an agent. For a 1-byte length field, what is the maximum value for the data length? Answer: 127 An object id defines a _______. Add a zero suffix to define the _______. Answer:variable; variable contents An SNMP agent can send _______ messages. Answer: Trap An SNMP agent can send _______ messages. Answer: Response The _______ field in the SNMP PDU is an offset that points to the variable in er ror. Answer:error index The _______ field in the SNMP PDU reports an error in a response message. Answer: error status The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values. Answer: VarBindList _________ is a repository of information linked together from points all over th e world. A) The WWW The WWW today is a _______ client-server service, in which a client using a br owser can access a service using a server. Answer:distributed The _________ is a standard for specifying any kind of information on the Inter net. Answer:URL In a URL, the _______ is the client-server program used to retrieve the documen t. Answer: protocol In a URL, the ______ is the computer on which the information is located. Answer: host In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon. Answer: none of the above In a URL, the _______ is the full name of the file where the information is loc ated.

Answer: path A cookie is made by the ________ and eaten by the _________. Answer: server; server The documents in the WWW can be grouped into ______ broad categories. Answer: three A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. Answer: static _____________ is a language for creating Web pages. Answer:HTML A _______ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic ___________ is a technology that creates and handles dynamic documents. Answer: CGI Dynamic documents are sometimes referred to as _________ dynamic documents. Answer: server-site For many applications, we need a program or a script to be run at the client si te. These are called _______________ documents. Answer: active One way to create an active document is to use __________. Answer: Java applets. Active documents are sometimes referred to as _________ dynamic documents. Answer: client-site HTTP uses the services of _________ on well-known port 80. Answer: TCP In HTTP, the first line in a request message is called a _______ line; the firs t line in the response message is called the ________ line. Answer: none of the above In a ___________ connection, one TCP connection is made for each request/respon se. Answer: nonpersistent In a ___________connection, the server leaves the connection open for more requ ests after sending a response. Answer: persistent HTTP version 1.1 specifies a _________connection by default. Answer:persistent In HTTP, a _______ server is a computer that keeps copies of responses to recen t requests. Answer: proxy An HTTP request message always contains _______. Answer: a request line and a header Which of the following is present in both an HTTP request line and a status lin e? Answer: HTTP version number The HTTP request line contains a _______ method to request a document from the s erver. Answer: GET A user needs to send the server some information. The request line method is __ _____. Answer: POST The HTTP request line contains a _______ method to get information about a docu ment without retrieving the document itself. Answer: HEAD A response message always contains _______. Answer:a status line and a header An applet is _______ document application program. Answer: an active In the original ARPANET, _______ were directly connected together.

answer: IMPs _______ was formed to connect universities with no defense ties. answer: CSNET This was the first network. answer: ARPANET Which organization has authority over interstate and international commerce in t he communications field? answer: FCC _______ are special-interest groups that quickly test, evaluate, and standardize new technologies. answer: Forums Which agency developed standards for physical connection interfaces and electron ic signaling specifications? answer: EIA _______ is the protocol suite for the current Internet. answer: TCP/IP A version of the _______ operating system included TCP/IP. answer: UNIX The _______ oversees the IETF and the IRTF. answer: IAB The _______ maintains and supports IAB. answer: ISOC _______ is the precursor to ICANN. answer: IANA _______ refers to the structure or format of the data, meaning the order in whic h they are presented.. answer: Syntax ________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. answer: Semantics _______ refers to two characteristics: when data should be sent and how fast it can be sent. answer: Timing An RFC, during its lifetime, falls into one of _______ maturity levels. A. 5 B. 2 C. 4 . D. None of the above answer: none of the above A proposed standard is elevated to ________ standard status after at least two s uccessful tries. answer: draft An RFC is labeled ________ if it must be implemented by all Internet systems. answer: required Why was the OSI model developed? answer: standards were needed to allow any two systems to communicate The _______ model shows how the network functions of a computer ought to be orga nized. answer: OSI The physical layer is concerned with the movement of _______ over the physical m edium. answer: bits The OSI model consists of _______ layers. answer: seven In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. answer: removed In the OSI model, when data is transmitted from device A to device B, the header from As layer 5 is read by Bs _______ layer. answer: session In the OSI model, which layer functions as a liaison between user support layers and network support layers? answer: transport layer

In the OSI model, what is the main function of the transport layer? answer: process-to-process message delivery In the OSI model, encryption and decryption are functions of the ________ layer. answer: presentation In the OSI model, which of the following is an application layer service? A) network virtual terminal B) file transfer, access, and management C) mail service answer: all of the above When a host on network A sends a message to a host on network B, which address d oes the router look at? answer: logical To deliver a message to the correct application program running on a host, the _ ______ address must be consulted. answer: port IPv6 has _______ -bit addresses. answer: 128 ICMPv6 includes _______. A) IGMP B) ARP C) RARP answer: a and b The ______ layer is responsible for moving frames from one hop (node) to the nex t. answer: data link The ______ layer adds a header to the packet coming from the upper layer that in cludes the logical addresses of the sender and receiver. answer: network The_________ layer is responsible for the delivery of a message from one process to another. answer: transport The Internetworking Protocol (IP) is a ________ protocol. A) reliable B) connection-oriented C) both a and b answer: none of the above _______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. answer: UDP __________ provides full transport layer services to applications. answer: TCP The ________ address, also known as the link address, is the address of a node a s defined by its LAN or WAN. answer: physical Ethernet uses a ______ physical address that is imprinted on the network interfa ce card (NIC). answer: 6-byte Which of the following can be an Ethernet physical address? answer: 07:01:02:01:2C:4B A port address in TCP/IP is ______ bits long. answer: 16 IP Version 5 was a proposal based on the ______ model. This version never went b eyond the proposal stage due to extensive layer changes and the projected expens e. answer: OSI 10BASE2 uses _______ cable while 10BASE5 uses _______. answer: thin coaxial, thick coaxial _______ specifies a physical star topology featuring a central hub and twisted-p air cable as the medium. answer: 10BASE-T Frame Relay operates in the _______. answer: physical and data link layers Which ATM layer has a 53-byte cell as an end product? answer: ATM The IP protocol uses the _______ sublayer. answer: AAL5

Repeaters function in the _______ layer. answer: physical Bridges function in the _______ layers. answer: physical and data link A bridge has access to the _______ address of a station on the same network. answer: physical Routers function in the _______ layers. answer: physical, data link, and network _______ has a higher transmission rate in the downstream direction than in the u pstream direction. answer: ADSL _______ is suitable for businesses that require comparable upstream and downstre am data rates. answer: SDSL _______ was designed as an alternative to the T-1 line. answer: HDSL A traditional TV network transmits signals _______. answer: downstream The second generation of cable networks is called a(n) _______ network. answer: HFC An HFC network uses _______ as the medium from the cable TV office to the fiber node. answer: optical fiber In an ESS the _______ station is mobile. answer: BSS In an ESS the _______ stations are part of a wired LAN. answer: AP SONET is a standard for _______ networks. answer: fiber-optic cable SONET is an acronym for _______ Network. answer: Synchronous Optical PPP is a _______ layer protocol. answer: physical and data link Identify the class of the following IP address: 4.5.6.7. answer: class A Identify the class of the following IP address: 229.1.2.3. answer: class D Identify the class of the following IP address: 191.1.2.3. answer: class B Which of the following is true of the IP address 231.1.2.3? answer: The class is D. Which of the following is true of the IP address 192.0.0.10? answer: The network address is 192.0.0.0. Using the direct broadcast address, a _______ sends a packet to _______ on the n etwork. answer: router; all other hosts Using the limited broadcast address, a _______ sends a packet to _______ on the network. answer: host; all other hosts The loopback address is used to send a packet from the _______ to _______. A) host; all other hosts B) router; all other hosts C) host; a specific host answer: none of the above A host can get its IP address from its server by using _______ as the source add ress and _______ as the destination address. answer: 0.0.0.0; 255.255.255.255 A host with an IP address of 142.5.0.1 needs to test internal software. What is the destination address in the packet? answer: 127.1.1.1 What is the result of ANDing 255 and 15?

answer: 15 What is the result of ANDing 0 and 15? answer: 0 What is the result of ANDing 254 and 15? answer: 14 What is the result of ANDing 192 and 65? answer: 64 A subnet mask in class A has 14 1s. How many subnets does it define? answer: 64 A subnet mask in class B has 19 1s. How many subnets does it define? answer: 8 A subnet mask in class C has 25 1s. How many subnets does it define? answer: 2 Which one is not a contiguous mask? answer: 255.148.0.0 Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? answer: 201.14.78.64 Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is th e subnet address? answer: 180.25.0.0 Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the s ubnet address? answer: 18.240.0.0 The subnet mask for a class C network is 255.255.255.192. How many subnetworks a re available? answer: 4 The subnet mask for a class B network is 255.255.224.0. How many subnetworks are available? answer: 8 The subnet mask for a class C network is 255.255.255.248. How many subnetworks a re available? answer: 16 The number of addresses in a class C block is _______. answer: 256 The number of addresses in a class B block is _______. answer: 65,534 The number of addresses in a class A block is _______. answer: 16,777,216 An organization has been granted a class A address. If the organization has 256 subnets, how many addresses are available in each subnet (including special addr esses)? answer: 65,534 An organization has been granted a class B address. If the organization has 64 s ubnets, how many addresses are available in each subnet (including special addre sses)? answer: 1024 An organization has been granted a class C address. If the organization has 4 su bnets, how many addresses are available in each subnet (including special addres ses)? A) 4 B) 1024 C) 256 answer: none of the above In classless addressing, __________ is assigned to a organization. answer: a variable-length block The number of addresses assigned to an organization in classless addressing ____ ___. answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s?

answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? A) 2.4.6.5 B) 2.4.6.15 C) 2.4.6.62 answer: none of the above Which address could be the beginning address of a block of 256 classless address es? answer: 2.4.6.0 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/27? answer: 12.2.2.64 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/10? answer: 12.0.0.0 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? answer: 12.2.2.112 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/24. answer: 256 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/30. answer: 4 What is the last address of a block of classless addresses if one of the address es is 12.2.2.127/28? answer: 12.2.2.127 What is the last address of a block of classless addresses if one of the address es is 12.2.2.6/30? answer: 12.2.2.7 In fixed-length subnetting, the number of subnets must _______. answer: be a power of 2 An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length? answer: /24 An organization is granted a block; one address is 2.2.2.64/25. If the subnet pr efix length is /28, what is the maximum number of subnets? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.64/28. How many addresses are granted? answer: 16 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.32.0/27. How many addresses are granted? answer: 32 What is the default mask for class A in CIDR notation? answer: /8 What is the default mask for class B in CIDR notation? answer: /16 What is the default mask for class C in CIDR notation? answer: /24 In ________ addressing, when an address is given, we can find the beginning addr ess and the range of addresses. answer: classful In classless addressing, the ______ is another name for the common part of the a ddress range. answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . answer: suffix

In classless addressing, the prefix length defines the _____________. answer: mask In a block, the prefix length is /22; what is the mask? answer: 255.255.252.0 In a block, the prefix length is /15; what is the mask? answer: 255.254.0.0 In a block, the mask is 255.255.192.0; what is the prefix length? answer: /18 In a block, the mask is 255.255.255.224; what is the prefix length? A) /20 B) /19 C) /20 answer: none of the above In _______ delivery, both the deliverer of the IP packet and the destination are on the same network. answer: a direct In _______ delivery, the deliverer of the IP packet and the destination are on d ifferent networks. answer: an indirect In _______ delivery, packets of a message are logically connected to one another . answer: a connection-oriented In _______ delivery, a packet is not connected to any other packet. answer: a connectionless In classful addressing, when a direct delivery is made, both the deliverer and r eceiver have the same _______. answer: netid In classful addressing, when an indirect delivery is made, the deliverer and rec eiver have _______. answer: different netids In _______ forwarding, the full IP address of a destination is given in the rout ing table. answer: host-specific In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in th e routing table. answer: default In _______ forwarding, the destination address is a network address in the routi ng table. answer: network-specific In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information. answer: next-hop In ________ addressing, a typical forwarding module can be designed using three tables, one for each unicast class (A, B, C). answer: classful In classful addressing, the class of the address can be found by shifting the co py of the address ____ bits to the right. answer: 28 In classful addressing we need a routing table with at least ______ columns. answer: 3 In classless addressing, we need a routing table with at least _______ columns. answer: 4 The idea of address aggregation was designed to alleviate the increase in routin g table entries when using ________. answer: classless addressing The principle of ________ states that the routing table is sorted from the longe st mask to the shortest mask. answer: longest mask matching The use of hierarchy in routing tables can ________ the size of the routing tabl es. answer: reduce _______ deals with the issues of creating and maintaining routing tables.

answer: Routing A _______ routing table contains information entered manually. answer: static A _______ routing table is updated periodically using one of the dynamic routing protocols. answer: dynamic The input and output ports of a router perform the ________ layer functions of t he router. answer: physical and data link The routing processor of a router performs the ________ layer functions of the r outer. answer: network The task of moving the packet from the input queue to the output queue in a rout er is done by _________. answer: switching fabrics A _______ address is an internetwork address with universal jurisdiction. answer: logical The logical addresses in the TCP/IP protocol suite are called _______ addresses. answer: IP A ________ is a local address. Its jurisdiction is over a local network. answer: physical If the sender is a host and wants to send a packet to another host on the same n etwork, the logical address that must be mapped to a physical address is ______. answer: the destination IP address in the datagram header If the sender is a host and wants to send a packet to another host on another ne twork, the logical address that must be mapped to a physical address is ______. answer: the IP address of the router found in the routing table The sender is a router that has received a datagram destined for a host on anoth er network. The logical address that must be mapped to a physical address is ___ ___. answer: the IP address of the router found in the routing table The sender is a router that has received a datagram destined for a host in the s ame network. The logical address that must be mapped to a physical address is __ ____. answer: the destination IP address in the datagram header In _______, a table associating a logical address with a physical address is upd ated manually. answer: static mapping _______ is a dynamic mapping protocol in which a logical address is found for a given physical address. answer: RARP _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. answer: ARP The target hardware address on an Ethernet is _______ in an ARP request. answer: 0x000000000000 An ARP reply is normally _______. answer: unicast An ARP request is normally _______. answer: broadcast A technique called ______ is used to create a subnetting effect. answer: proxy ARP A _______ is an ARP that acts on behalf of a set of hosts. answer: proxy ARP A sender usually has more than one IP datagram to send to the same destination. It is inefficient to use the ARP protocol for each datagram destined for the sam e host or router. The solution is the _________. answer: ARP table The RARP reply packets are normally_________ . answer: unicast

The ARP component that sends an ARP reply to the data link layer is the _______. answer: input module The ARP component that sends an IP packet to a queue is the _______. answer: output module The ________ protocol is the transmission mechanism used by the TCP/IP suite. answer: IP IP is _________ datagram protocol. answer: both a and b The term ________ means that IP provides no error checking or tracking. IP assum es the unreliability of the underlying layers and does its best to get a transmi ssion through to its destination, but with no guarantees. answer: best-effort delivery A best-effort delivery service such as IP includes _______. answer: none of the above An HLEN value of decimal 10 means _______. answer: there are 40 bytes in the header A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identification field is the same for all three datagrams. Which field or bit value unambiguously identifies the datagram as a fragment? answer: Fragment offset = 1000 If the fragment offset has a value of 100, it means that _______. answer: the first byte of the datagram is byte 800 What is needed to determine the number of the last byte of a fragment? answer: b and c (total length) The IP header size _______. answer: is 20 to 60 bytes long Packets in the IP layer are called _________ . answer: datagrams The total length field defines the total length of the datagram _________. answer: including the header When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______. answer: MTU Which IP option is used if exactly four specific routers are to be visited by th e datagram? answer: strict source route For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field. answer: 0 The IP header field formerly known as the service type field is now called the _ ______ field. answer: differentiated services The _______ module takes fragments of a message and puts them back in order. answer: reassembly The _______ module sends out an IP packet, the next-hop address, and interface i nformation. answer: forwarding The _______ module discards datagrams with a TTL value of zero. answer: processing The output of the _______ module is an IP packet destined for an upper-layer pro tocol. answer: reassembly The _______ module consults the MTU table to determine the packet size necessary for transmission. answer: fragmentation The value of the ________ subfield in an option controls the presence of the opt ion in fragmentation. answer: copy The value of the ________ subfield defines the general purpose of an option.

answer: class The value of the ________ subfield defines the types of an option. answer: number Only ______ end of option option can be used in a datagram. answer: one ICMP is a _________ layer protocol. answer: network ICMP messages are divided into two broad categories: answer: query and error reporting messages An ICMP message has _____ header and a variable-size data section. answer: an 8-byte Which of the following is true about ICMP messages? answer: none is true Which of the following is true about ICMP messages? answer: An ICMP error message may be generated only for the first fragment. Which of the following is true about ICMP messages? answer: No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0. If a host needs to synchronize its clock with another host, it sends a _______ m essage. answer: check node-to-node communication In error reporting the encapsulated ICMP packet goes to _______. answer: the original sender What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)? answer: type When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent. answer: time-exceeded When all fragments of a message have not been received within the designated amo unt of time, a _______ error message is sent. answer: time-exceeded Errors in the header or option fields of an IP datagram require a _______ error message. answer: parameter-problem A _______ can learn about network _______ by sending out a router-solicitation p acket. answer: host, routers Who can send ICMP error-reporting messages? answer: a and b ( routers & destination hosts) One method to alert a source host of congestion is the _______ message. answer: source-quench A time-exceeded message is generated if _______. answer: a and b (the round-trip time between hosts is close to zero & fragments of a message do not arrive within a set time) To determine whether or not a node is reachable, _______ message can be sent. answer: an echo-request In calculating the time difference between two clocks, a negative value indicate s _______. answer: the destination clock lags behind the source clock An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encap sulates the ICMP packet contains _______. answer: the ICMP header plus 8 bytes of datagram A In the ICMP package, ICMP packets are the output of _______. answer: both the input and the output module ICMP packets are the input to _______. answer: only the input module IGMP is a companion to the ______ protocol. A) UDP B) TCP C) ICM answer: none of the above

IGMP is _______ protocol. answer: a group management IGMP helps a ________ router create and update a list of loyal members related t o each router interface. answer: multicast IGMP operates __________. answer: locally An IGMP query is sent from a _______ to a _______. answer: router; host or router The _______ is used by a router in response to a received leave report. answer: special query message The least significant 23 bits in a 48-bit Ethernet address identify a ________. answer: multicast group The _______ field of the IGMP message is all zeros in a query message. answer: group address The _______ field of the IGMP message is 17 for a query message. answer: type A multicast message is sent from _______ to _______. answer: one source; multiple destinations In networks that do not support physical multicast addressing, multicasting can be accomplished through _______. answer: tunneling If four hosts on a network belong to the same group, a total of _______ sent in response to a general query message. answer: two membership reports are A process called _______ sends a multicast packet through WANs that do not suppo rt physical multicast addressing. answer: tunneling A group table entry is in the _______ state if there is no corresponding timer r unning. answer: IDLE A group table entry in the _______ state sends a request when its timer expires. answer: DELAYING The _______ module receives an IGMP report or query. answer: input The _______ module sends out an IGMP report. answer: output The _______ module can create a new entry in the group table and start a timer. answer: group-joining The _______ module can decrement the reference count in the group table. answer: group-leaving In IGMP, a membership report is sent _______. answer: twice In IGMP, the general query message ___________________ group. answer: does not define a particular To prevent unnecessary traffic, IGMP uses ______________ strategy. answer: a delayed response To prevent unnecessary traffic, IGMP designates one router as the __________ for each network. answer: query router An IGMP packet is carried in an __________ packet. answer: IP The IP packet that carries an IGMP packet has a value of _______ in its protocol field. answer: 2 One of the responsibilities of the transport layer protocol is to create a _____ _ communication. answer: process-to-process UDP is called a ________________transport protocol. answer: connectionless, unreliable

UDP does not add anything to the services of IP except for providing _______ com munication. answer: process-to-process UDP is an acronym for _______. answer: User Datagram Protocol Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm. answer: client-server The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ . answer: port addresses The ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These ar e the ___________ ports. answer: well-known The ports ranging from 1,024 to 49,151 are not assigned or controlled by ICANN. They are called ___________ ports. answer: registered The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports. answer: dynamic In the sending computer, UDP receives a data unit from the _______ layer. answer: application In the sending computer, UDP sends a data unit to the _______ layer. answer: IP UDP and TCP are both _______ layer protocols. answer: transport Which of the following functions does UDP perform? answer: process-to-process communication When the IP layer of a receiving host receives a datagram, _______. answer: a transport layer protocol takes over UDP needs the _______ address to deliver the user datagram to the correct applic ation process. answer: port A port address in UDP is _______ long. answer: 16 Which of the following does UDP guarantee? A) flow control B) connection-orien ted delivery C) flow control answer: none of the above The source port address on the UDP user datagram header defines _______. answer: the process running on the sending computer The combination of an IP address and a port number is called a ____________. answer: socket address To use the services of UDP, we need ________ socket addresses. answer: two UDP packets are called __________ . answer: user datagrams UDP packets have a fixed-size header of _______ bytes. answer: 8 UDP packets are encapsulated in ___________ . answer: an IP datagram UDP uses ________ to handle outgoing user datagrams from multiple processes on o ne host. answer: multiplexing UDP uses _______ to handle incoming user datagrams that go to different processe s on the same host. answer: demultiplexing TCP is a __________protocol. answer: stream-oriented TCP allows the sending process to deliver data as a _______of bytes and allows t he receiving process to obtain data as a _________ of bytes..

answer: stream; stream Because the sending and the receiving processes may not write or read data at th e same speed, TCP ________. answer: uses buffers TCP groups a number of bytes together into a packet called a ___________. answer: segment TCP is a ___________ protocol.. answer: connection-oriented TCP is a(n) _______ transport protocol. answer: reliable TCP uses _________________ to check the safe and sound arrival of data. answer: an acknowledgment mechanism The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________. answer: randomly generated number TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . answer: first Communication in TCP is ___________. answer: full-duplex The value of the acknowledgment field in a segment defines the number of the ___ ___byte a party expects to receive. answer: next The acknowledgment number is ________. answer: cumulative The value of window size is determined by _________. answer: the receiver The inclusion of the checksum in the TCP segment is ________. answer: mandatory A TCP segment is encapsulated in __________. answer: an IP datagram Connection establishment in TCP is called __________ handshaking. A) two-way B) four-way C) one-way answer: none of the above A SYN segment cannot carry data; it consumes _____ sequence number(s). answer: one A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers. A) no B) three C) two answer: none of the above An ACK segment, if carrying no data, consumes ______ sequence number(s). answer: no The connection establishment procedure in TCP is susceptible to a serious securi ty problem called the _________ attack. answer: SYN flooding The SYN flooding attack belongs to a group of security attacks known as a _____ attack. answer: denial of service The FIN segment consumes ____ sequence numbers if it does not carry data. A) two B) three C) no answer: none of the above The FIN + ACK segment consumes _____ sequence number(s) if it does not carry dat a. answer: one In TCP, one end can stop sending data while still receiving data. This is called a ______ . answer: half-close A(n) _________ machine is a machine that goes through a limited number of states . answer: finite state

A common value for MSL is between___ seconds and ___ minute(s). answer: 30; 1 __________ control regulates the amount of data a source can send before receivi ng an acknowledgment from the destination.. answer: Flow To accomplish flow control, TCP uses a ___________ window protocol. answer: sliding TCP sliding windows are __________ oriented. answer: byte In TCP, the size of the window is the ________ of rwnd and cwnd. answer: minimum In TCP, the window should not be _________. answer: shrunk In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down. answer: one A serious problem can arise in the sliding window operation when either the send ing application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______. answer: silly window syndrome Nagle's algorithm can solve the silly window syndrome created by the _________. answer: sender Clark's solution can solve the silly window syndrome created by the _________. answer: receiver Delayed acknowledgment can solve the silly window syndrome created by the ______ ___. answer: receiver ACK segments consume _______ sequence number(s) and _______ acknowledged. answer: no; are not In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived. answer: three In TCP, ________ retransmission timer is set for an ACK segment. answer: no TCP delivers _______ out-of-order segments to the process. answer: no Lost acknowledgments may create a _______ if they are not handled properly. answer: deadlock In the ________ algorithm the size of the congestion window increases exponentia lly until it reaches a threshold. answer: slow start In the __________ algorithm the size of the congestion window increases additive ly until congestion is detected. answer: congestion avoidance In the congestion detection algorithm, if detection is by a time-out, a new ____ ___ phase starts. answer: slow start In the congestion detection algorithm, if detection is by three ACKs, a new ____ ___ phase starts. answer: congestion avoidance In TCP, there can be ______ RTT measurement(s) in progress at any time. answer: only one The value of the window scale factor can be determined during __________. answer: connection establishment IP is responsible for _______ communication while TCP is responsible for _______ communication. answer: host-to-host; process-to-process If a segment carries data along with an acknowledgment, this is called _______. answer: piggybacking Multiply the header length field by _______ to find the total number of bytes in

the TCP header. answer: 4 Urgent data requires the urgent pointer field as well as the URG bit in the ____ ___ field. answer: control Which of the following is not a valid acknowledgment number? answer: 232 The options field of the TCP header ranges from 0 to _______ bytes. answer: 40 Which option defines the maximum number of bytes in a TCP segment? answer: maximum segment size If the ACK value is 200, then byte _______ has been received successfully. answer: 199 The _______ timer prevents a long idle connection between two TCPs. answer: keepalive The _______ timer is needed to handle the zero window-size advertisement. answer: persistence Karn's algorithm is used in calculations by the _______ timer. answer: retransmission In the _______ state, the client TCP has closed its connection to the server. answer: FIN-WAIT-2 A special segment called a probe is sent by a sending TCP when the _______ timer goes off. answer: persistence Stream Control Transmission Protocol (SCTP) is a new _____________protocol. answer: reliable, message-oriented SCTP allows __________ service in each association. answer: multistream SCTP association allows _____________ for each end. answer: multiple IP addresses In SCTP, a data chunk is numbered using ________. answer: a TSN To distinguish between different streams, SCTP uses ___________. answer: an SI To distinguish between different data chunks belonging to the same stream, SCTP uses ___________. answer: SSNs TCP has ____________; SCTP has ____________. answer: segments; packets The control information in SCTP is included in the ________. answer: control chunks An SCTP packet can carry __________. answer: several data chunks Options in SCTP ____________________________. answer: are handled by defining new chunk types The general header in SCTP is _______ bytes. answer: 12 An SCTP sequence number (TSN) is located in the _______. answer: data chunk header In SCTP, the acknowledgment number and window size are part of each ________. answer: control chunk There is no need for a header length field in SCTP because ________________. answer: both a and b (there are no options in the general header & the size of t he header is fixed) The checksum in SCTP is ________ bits. answer: 32 The association identifier in SCTP is __________________ . answer: a unique verification tag The association identifier in SCTP cannot be a combination of logical and port a ddresses because of ________________.

answer: multihoming service In SCTP, control information and data information are carried in _______ chunks. answer: different chunks Control chunks in SCTP ___________________. answer: never use a TSN, IS, or SSN number In SCTP, TSN is a cumulative number identifying the _______; SI defines the ____ ___; SSN defines the ________. answer: association; stream; chunks in a stream In SCTP, acknowledgment numbers are used to acknowledge _____________. answer: only data chunks In an SCTP packet, control chunks come ___________ data chunks. answer: before In SCTP, chunks need to terminate on a _______boundary. answer: 32-bit In SCTP, the number of padding bytes are _________ in the value of the length fi eld. answer: not included In SCTP, a DATA chunk ______carry data belonging to more than one message. answer: cannot In SCTP, a message ________ split into several chunks. answer: can be In SCTP, the data field of the DATA chunk must carry at least _________ byte of data, which means the value of length field cannot be less than ___________. answer: 1; 17 In SCTP, ___________ can be carried in a packet that carries an INIT chunk. answer: no other chunk A connection in SCTP is called an ____________. answer: association The acknowledgment in SCTP defines the cumulative TSN, the TSN of the __________ __ . answer: last data chunk received in order A DATA chunk arrives with its B/E bits equal to 00. It is ___________. answer: the middle fragment A DATA chunk arrives with its B/E bits equal to 01. It is ___________. answer: the last fragment A DATA chunk arrives with its B/E bits equal to 10. It is ___________. answer: the first fragment A DATA chunk arrives with its B/E bits equal to 11. It is ___________. answer: not fragmented The number of states in the state transition diagram of SCTP is __________ the n umber of states in the state transition diagram of TCP. answer: less than Which chunk is not involved in association establishment? answer: SACK chunk Which chunk probes the condition of an association? answer: HEARTBEAT chunk The _______ chunk is sent when an end point finds an error in a received packet. answer: ERROR In SCTP, duplicate messages are _______. answer: b and c (tracked) SCTP strategies for congestion control include _______. A) exponent ial increase B) additive increase C) multiplicative decrease answer: all of the above We can divide audio and video services into _______ broad categories. answer: three ________ audio/video refers to on-demand requests for compressed audio/video fil es. answer: Streaming stored ___________ audio/video refers to the broadcasting of radio and TV programs thro ugh the Internet.

answer: Streaming live _________ audio/video refers to the use of the Internet for interactive audio/vi deo applications. answer: Interactive According to the Nyquist theorem, we need to sample an analog signal ________tim es the highest frequency. answer: two In ________ encoding, the differences between the samples are encoded instead of encoding all the sampled values. answer: predictive __________ encoding is based on the science of psychoacoustics, which is the stu dy of how people perceive sound. answer: Perceptual ____________ is used to compress images. answer: JPEG ____________ is used to compress video. answer: MPEG The first phase of JPEG is ___________. answer: DCT transformation The second phase of JPEG is ___________. answer: quantization The third phase of JPEG is ___________. answer: data compression Jitter is introduced in real-time data by the _______________. answer: delay between packets To prevent _________, we can timestamp the packets and separate the arrival time from the playback time. answer: jitter A ________buffer is required for real-time traffic. answer: playback A __________on each packet is required for real-time traffic. answer: both a and b (timestamp $ sequence number) Real-time traffic needs the support of ____________. answer: multicasting __________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network. answer: Translation __________ means combining several streams of traffic into one stream. answer: Mixing _________ is not suitable for interactive multimedia traffic because it retransm its packets in case of errors. answer: TCP __________ is the protocol designed to handle real-time traffic on the Internet. answer: RTP RTP uses a temporary even-numbered _______ port. answer: UDP ___________ is a protocol for controlling the flow and quality of data. answer: RTCP RTCP uses an odd-numbered _______ port number that follows the port number selec ted for RTP. answer: UDP ___________ is an application protocol that establishes, manages, and terminates a multimedia session answer: SIP _______ is a standard to allow telephones on the public telephone network to tal k to computers connected to the Internet. answer: H.323 A real-time video performance lasts 10 min. If there is jitter in the system, th e viewer spends _______ minutes watching the performance. answer: more than 10

A _______ shows the time a packet was produced relative to the first or previous packet. answer: timestamp _______ are used to number the packets of a real-time transmission. answer: Sequence numbers In a real-time video conference, data from the server is _______ to the client s ites. answer: multicast A _______ adds signals from different sources to create a single signal. answer: mixer A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal. answer: translator An RTP packet is encapsulated in _______. answer: a UDP user datagram When there is more than one source, the _______ identifier defines the mixer. answer: synchronization source Private networks, hybrid networks, and virtual private networks can provide ____ _____ for organizations answer: privacy Both private and hybrid networks have a major drawback: _________. answer: cost A _______ network allows an organization to have its own private internet and, a t the same time, access the global Internet. answer: hybrid When an organization uses a private network, it _______________. answer: can use a block of addresses without permission from the Internet author ities VPN is a network that is _______ but ________. answer: private; virtual A VPN is physically ________ but virtually ________. answer: public; private VPN technology uses two simultaneous techniques to guarantee privacy for an orga nization: ________ and ___________. answer: IPSec; tunneling ____________ means that each IP datagram destined for private use in the organiz ation must be encapsulated in another datagram. answer: Tunneling __________ technology allows a site to use a set of private addresses for intern al communication and a set of global Internet addresses for communication with a nother site. answer: NAT Using _______, all of the outgoing packets go through the corresponding router, which replaces the source address in the packet with the appropriate global addr ess. answer: NAT An _______ is a private network with no external access that uses the TCP/IP pro tocol suite. answer: intranet An _______ is a private network with limited external access that uses the TCP/I P protocol suite. answer: extranet A _______ network is totally isolated from the global Internet. answer: private A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. answer: hybrid A VPN can use _______ to guarantee privacy. answer: both a and b (IPSec & tunneling) Tunneling is a technique in which the IP datagram is first _______ and then ____

___. answer: encrypted; encapsulated in another datagram _______ is a technology using a set of global Internet addresses and a set of pr ivate addresses. answer: NAT On a network that uses NAT, the _______ has a translation table. answer: router On a network that uses NAT, _______ initiates the communication. answer: an internal host On a network that uses NAT, the router can use _______ global address(es). answer: a pool of An IPv6 address is _________ bits long. answer: 128 In IPv6, options are inserted between the _________ and the ___________ data. answer: base header; upper-layer data IPv6 allows _________ security provisions than IPv4. answer: more An IPv6 address consists of ________ bytes (octets); answer: 16 To make addresses more readable, IPv6 specifies ____________notation. answer: hexadecimal colon In hexadecimal colon notation, a 128-bit address is divided into _______ section s, each _____ hexadecimal digits in length. answer: 8: 4 An IPv6 address can have up to __________ colons. answer: 7 An IPv6 address can have up to __________ hexadecimal digits. answer: 32 If an IPv6 address has digits of ________, we can abbreviate the address. answer: 0s In IPv6, _______ address defines a single computer. answer: a unicast In IPv6, ____ address defines a group of computers with addresses that have the same prefix. answer: an anycast _________ address defines a group of computers. answer: A multicast In IPv6, the ________ prefix defines the purpose of the address. answer: type In IPv6, the___________ address is generally used by a normal host as a unicast address. answer: provider-based unicast A _________ address comprises 80 bits of zero, followed by 16 bits of one, follo wed by the 32-bit IPv4 address. answer: mapped A ___________ address is an address of 96 bits of zero followed by 32 bits of IP v4 address. A) link local B) site local C) mapped answer: none of the above A _______ address is used if a LAN uses the Internet protocols but is not connec ted to the Internet for security reasons. answer: link local The ______ address is used if a site with several networks uses the Internet pro tocols but is not connected to the Internet for security reasons. answer: site local Which of the following is a necessary part of the IPv6 datagram? answer: a and b (base header & data packet from the upper layer) The _______ field in the base header restricts the lifetime of a datagram. answer: hop limit When a datagram needs to be discarded in a congested network, the decision is ba sed on the _______ field in the base header.

answer: priority The _______ field in the base header and the sender IP address combine to indica te a unique path identifier for a specific flow of data. answer: flow label In the _______ extension header, the destination address changes from router to router. answer: source routing To request the physical address of a host whose IP address is known, a _______ m essage is sent. answer: neighbor-solicitation If a host needs information about routers on the network, it sends a _______ mes sage. answer: router-solicitation The ARP function in version 4 is part of _______ in version 6. answer: neighbor solicitation and advertisement The IGMP functions in version 4 are part of _______ in version 6. answer: group membership To join a group, a host sends a _______. answer: group-membership report The purpose of echo request and echo reply is to _______. answer: check node-to-node communication A router sends a _______ message to the host to monitor group membership. answer: query In error reporting the encapsulated ICMP packet goes to _______. answer: the source In error reporting, a destination can send a _______ message if an option is not recognized. answer: parameter-problem An MTU field is found on the _______ error message to inform the sender about pa cket size. answer: none of the above When all fragments of a message have not been received within the designated amo unt of time, a _______ error message is sent. answer: time-exceeded When the hop count field reaches zero and the destination has not been reached, a _______ error message is sent. answer: time-exceeded Errors in the header or option fields of an IP datagram require a _______ error message. answer: parameter-problem If a member of a group wishes to terminate membership, it can _______ in respons e to a group membership query. answer: send a group membership termination In version 6, an independent protocol called _______ is eliminated. answer: IGMP The _______ packet contains information about a router. answer: router advertisement When a host has the _______ address of a host but needs the _______ address, it uses a neighbor solicitation packet. answer: IP; physical A router can send a _______ message to a host to inform it of a more efficient p ath. answer: redirection Which version 4 protocols are still viable and known by their same names in vers ion 6? A) IGMP B) ARP C) RARP answer: none of the above Which error-reporting message from version 4 has been eliminated in version 6? answer: source quench Which error-reporting message is found in version 6 but not in version 4? answer: packet too big

In cryptography, the encryption/decryption algorithms are ________; the keys are ________. answer: public; secret In __________cryptography, the same key is used by the sender (for encryption) a nd the receiver (for decryption). answer: symmetric-key In _________ cryptography, the same key is used in both directions. answer: symmetric-key The DES cipher uses the same concept as the _________ cipher, but the encryption / decryption algorithm is much more complex. answer: Caesar _________ cryptography is often used for long messages. answer: Symmetric-key ___________ algorithms are more efficient for short messages. answer: Asymmetric-key __________means that the sender and the receiver expect confidentiality. answer: none of the above ___________ means that the data must arrive at the receiver exactly as they were sent. answer: Message integrity ______________ means that the receiver needs to be sure of the sender identity a nd that an imposter has not sent the message. answer: Message authentication ______________ can provide authentication, integrity, and nonrepudiation for a m essage. answer: Digital signature Digital signature does not provide _________. answer: privacy In ___________, the entity identity is verified once for the entire duration of system access. answer: entity authentication The symmetric (shared) key in the Diffie-Hellman protocol is ____________. answer: K = Gxy mod N In __________ cryptography, everyone has access to everyones public key. answer: asymmetric-key ___________servers are involved in the Kerberos protocol. answer: Three In Kerberos, the _______ is the KDC. answer: AS In Kerberos, the _______ issues the ticket for the real server. answer: TGS In Kerberos, the ___________ provides services for the entity. answer: real server Kerberos allows the global distribution of ASs and TGSs, with each system called a ________ answer: realm IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level. answer: network IPSec requires a logical connection between two hosts using a signaling protocol called ____________. answer: SA IPSec operates at two different modes: _________ mode and _________mode. answer: transport; tunnel In the _________ mode, the IPSec header is added between the IP header and the r est of the packet. answer: transport In the ________ mode, the IPSec header is placed in front of the original IP hea der. answer: tunnel

IPSec defines two protocols: _________ and __________. A) AH: SSP B) ESP; SSP C) AH: EH answer: none of the above The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet. answer: AH The _______ protocol provides message authentication and integrity, but not priv acy. answer: AH The _______ protocol provides message authentication, integrity, and privacy. answer: ESP The _______ was designed to provide security at the transport layer. answer: TLS _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email. A) AH B) ESP C) TLS answer: none of the above A packet-filter firewall filters at the ________ or ___________ layer. answer: network; transport A proxy firewall filters at the __________ layer. answer: application Before a message is encrypted, it is called _______. answer: plaintext After a message is encrypted, it is called _______. answer: ciphertext If 20 people need to communicate using symmetric-key cryptography, _______ symme tric keys are needed. answer: 190 In the asymmetric-key method of cryptography, which key is publicly known? answer: encryption key only In the asymmetric-key method of cryptography, the receiver has possession of the _______. answer: private key The RSA algorithm uses _______ cryptography method. answer: an asymmetric-key If user A wants to send an encrypted message to user B, the plaintext is encrypt ed with the public key of _______. answer: user B In the digital signature technique when the whole message is signed using an asy mmetric key, the sender of the message uses _______ to sign the message. answer: his or her own private key In the digital signature technique when the whole message is signed using an asy mmetric key, the receiver of the message uses _______ to verify the signature. answer: the senders public key A _______ is a trusted third party that solves the problem of symmetric-key dist ribution. answer: KDC A _______ certifies the binding between a public key and its owner. answer: CA In a _______ attack, a message captured by an intruder is illegally sent a secon d time. answer: replay A _______ is a large number used only once that helps distinguish a fresh authen tication request from a repeated one. answer: nonce In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are p ublic numbers. answer: Diffie-Hellman In a _______ attack, an intruder comes between two communicating parties, interc epting and replying to their messages. answer: man-in-the-middle

_______ is an authentication protocol that needs an authentication server and a ticket-granting server. answer: Kerberos static table is one _______. Answer: with manual entries A dynamic table is one _______. Answer: which is updated automatically For purposes of routing, the Internet is divided into ___________. Answer: autonomous systems ____________ is a group of networks and routers under the authority of a single administration. Answer: An autonomous system Routing inside an autonomous system is referred to as _______________. Answer:intradomain routing Routing between autonomous systems is referred to as ____________. Answer: interdomain routing In _______ routing, the least cost route between any two nodes is the route with the minimum distance. Answer: distance vector In ________, each node maintains a vector (table) of minimum distances to every node. Answer: distance vector In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change. Answer: its immediate neighbors The Routing Information Protocol (RIP) is an intradomain routing based on ______ ___ routing. Answer: distance vector The metric used by _______ is the hop count. Answer:RIP In RIP, the ________ timer controls the advertising of regular update messages. Answer:periodic In RIP, the ________ timer is used to purge invalid routes from the table. Answer:garbage collection In RIP, the ________ timer controls the validity of the route. Answer:expiration RIP uses the services of _______. Answer:UDP The _________ routing uses the Dijkstra algorithm to build a routing table. Answer:link state The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing. Answer:link state The _______ protocol allows the administrator to assign a cost, called the metri c, to each route. Answer:OSPF In OSPF, a ________ link connects two routers without any other host or router i n between. Answer: point-to-point In OSPF, a _______ link is a network with several routers attached to it. Answer:transient In OSPF, a ________ link is a network is connected to only one router. In OSPF, when the link between two routers is broken, the administration may cre ate a _________ link between them using a longer path that probably goes through several routers. Answer:none of the above In OSPF, a ________ defines the links of a true router. Answer:router link In OSPF, a ________ defines the links of a network. Answer:network link

In OSPF, an area border router advertises a ____________ LSA. Answer:summary link to network OSPF uses the _______ message to create neighborhood relationships and to test t he reachability of neighbors. Answer:none of the above In OSPF, the ________ message does not contain complete database information; it only gives an outline, the title of each line in the database. Answer:database description In OSPF, a _________ message is sent by a router that needs information about a specific route or routes. Answer:link state request In ________ routing, we assume that there is one node (or more) in each autonomo us system that acts on behalf of the entire autonomous system. Answer:path vector ___________ is an interdomain routing protocol using path vector routing. Answer:BGP BGP can have two types of sessions: _______ and ________ sessions. Answer:E-BGP; I-BGP To create a neighborhood relationship, a router running BGP sends an ________ me ssage. Answer:open In BGP, the _______ message is used by a router to withdraw destinations that ha ve been advertised previously, or to announce a route to a new destination, or b oth. Answer:keepalive The routers running the BGP protocols exchange _______ messages regularly to tel l each other that they are alive. Answer:keepalive In BGP, a _______ message is sent by a router whenever an error condition is det ected or a router wants to close the connection. Answer:none of the above BGP messages are encapsulated in _______. Answer:TCP segments An area is _______. Answer:part of an AS A one-to-all communication between one source and all hosts on a network is clas sified as a _______ communication. Answer:broadcast A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication. Answer:multicast A one-to-one communication between one source and one destination is classified as a _______ communication. Answer: none of the above In ______, the router forwards the received packet through only one of its inter faces. Answer:unicasting In _______, the router may forward the received packet through several of its in terfaces. Answer:multicasting Emulation of ________ through ___________ is not efficient and may create long d elays. Answer:multicasting; multiple unicasting In unicast routing, each router in the domain has a table that defines a ______ path tree to possible destinations. Answer:shortest In multicast routing, each involved router needs to construct a ________ path tr ee for each group. Answer:shortest In the _______ tree approach, each router needs to have one shortest path tree f

or each group. Answer: source-based In the group-shared tree approach, _________ involved in multicasting. Answer:only the core router is Multicast link state routing uses the _______ tree approach. Answer: source-based The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the O SPF protocol that uses multicast routing to create source-based trees. The proto col is based on _______ routing. Answer:link state MOSPF is a _______ protocol. Answer:data-driven _________ broadcasts packets, but creates loops in the systems. Answer:Flooding In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router. Answer:shortest RPF eliminates the ________ in the flooding process. Answer: none of the above RPF guarantees that each network receives only ____ of the multicast packet. Answer:none of the above RPB creates a shortest path _______ tree from the source to each destination. Answer:broadcast RPB guarantees that each destination receives _________ of the packet. Answer:one copy In ________, the multicast packet must reach only those networks that have activ e members for that particular group. Answer:RPM ______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes. Answer:RPM; RPB __________ is an implementation of multicast distance vector routing. It is a so urce-based routing protocol, based on RIP. Answer:DVMRP DVMRP is a ________routing protocol, based on RIP. Answer:source-based Pruning and grafting are strategies used in _______. Answer:RPM A _______ message tells an upstream router to stop sending multicast messages fo r a specific group through a specific router. Answer:prune A _______ message tells an upstream router to start sending multicast messages f or a specific group through a specific router. Answer:graft CBT is a ________ protocol that uses a core as the root of the tree. Answer:group-shared PIM-DM is used in a _______ multicast environment, such as a LAN. Answer: dense PIM-SM is used in a _______multicast environment such as a WAN. Answer:sparse In _______, a logical tunnel is established by encapsulating the multicast packe t inside a unicast packet. Answer:MBONE The Bootstrap Protocol (BOOTP) is a client/server protocol designed to provide ________ of information for a diskless computer or a computer that is booted for the first time. Answer:four pieces The BOOTP client and server can be on _______. Answer:both a and b If BOOTP client and server are on different networks, there is a need for an in

termediary called a _______. Answer:relay agent In BOOTP, the client uses ________ port and the server uses _________port. Answer:a well-known; a well-known In BOOTP, the server uses the well-known port _______; the client uses the well -known port _______. Answer:67; 68 In BOOTP, the client often needs to use ________ to obtain the complete informat ion it needs. Answer:TFTP BOOTP uses the services of _______. Answer:UDP BOOTP is a ________ configuration protocol. Answer:static DHCP is a _______ configuration protocol. Answer:both a and b DHCP can be configured ___________. Answer:manually / automatically DHCP client can be in one of ___________ states. Answer:6 When the DHCP client first starts, it is in the _______ state. Answer:initializing After sending the DHCPDISCOVER message, the client goes to the _______ state. Answer:selecting The default lease time of an IP address offer is ________. Answer:1 hour After sending the DHCPDISCOVER message, the client goes to the _______ state. Answer:selecting _______ is backward compatible with __________. Answer:DHCP; BOOTP After the selecting state, a DHCP client can go to the ________state. Answer:requesting After the rebinding state, a DHCP client can go to the __________ state. Answer:initializing / bound After the bound state, a DHCP client can go to the __________ state. Answer:renewing After the renewing state, a DHCP client can go to the __________ state. Answer:rebinding In a _______ name space, a name is assigned to an address. A name in this space is a sequence of characters without structure. Answer: flat In a _________name space, each name is made of several parts. Answer:hierarchical To have a hierarchical name space, a ______________ was designed. Answer: domain name space In the DNS, the names are defined in ___________ structure. Answer:an inverted-tree Each node in the tree has a _______, which is a string with a maximum of ___ ch aracters. Answer:label; 63 The root of the DNS tree is _______. Answer: an empty string A full domain name is a sequence of labels separated by ________. Answer: dots If a label is terminated by a null string, it is called a __________. Answer: FQDN If a label is not terminated by a null string, it is called a __________. Answer: PQDN A _________ is a subtree of the domain name space. Answer: domain

What a server is responsible for or has authority over is called a _________. Answer: zone A _______ is a server whose zone consists of the whole tree. Answer: root server A ________ server loads all information from the disk file. Answer: primary A ________ server loads all information from the primary server. Answer: secondary When the secondary downloads information from the primary, it is called ______ t ransfer. Answer: zone In the Internet, the domain name space (tree) is divided into _______ different sections: Answer: three The _______ domains define registered hosts according to their generic behavior. Answer: generic The first level in the generic domains section allows ______ possible labels. Answer: none of the above The ____________ domain section uses two-character country abbreviations. Answer:country The _________ domain is used to map an address to a name. Answer: inverse In __________ resolution, the resolver expects the server to supply the final an swer. Answer:recursive In __________ resolution, the server returns the IP address of the server that i t thinks can resolve the query. Answer:iterative In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: edu In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer:chal A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DN S hierarchical tree. (The root is level one.) Answer: fifth A pointer query involves the _______ domain. Answer:inverse DNS can use the services of ________ using the well-known port 53. Answer: UDP / TCP TELNET is an abbreviation for ____________. Answer:terminal network is a ________ client-server application program. Answer:general-purpose When a user logs into a local time-sharing system, it is called ________ login. Answer:local When a user wants to access an application program or utility located on a remot e machine, he or she performs ___________ login. Answer:remote NVT uses two sets of characters, one for _____and one for __________. Answer:data; control For data, NVT uses US ASCII characters with the highest order bit set to ______. Answer:0 For control, NVT uses US ASCII characters with the highest order bit set to ___ ___. Answer:1 TELNET uses only one TCP connection. The server uses ________ port and the clien t uses ________ port. Answer:a well-known; an ephemeral

To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________. Answer:IAC To make control characters effective in special situations, TELNET uses ______ s ignaling. Answer:out-of-band In the _______ mode, the echoing is done by the client. Answer:default In the _______ mode, each character typed is sent by the client to the server. Answer:characte In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client. Answer:line The _______ is software residing on the remote system that allows the remote sys tem to receive characters from a TELNET server. Answer: pseudoterminal driver The _______ translates local characters into NVT form. Answer:TELNET client The _______ translates NVT characters into a form acceptable by the remote opera ting system. Answer:TELNET server If the sender wants to disable an option, it sends a _______ command. Answer:WONT If the sender wants to enable an option, it sends a _______ command. Answer:WIL If the sender wants an option disabled by the receiver, it sends a _______ comma nd. Answer:DONT If the sender wants an option enabled by the receiver, it sends a _______ comman d. Answer:DO _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another. Answer:none of the above FTP uses the services of ________. Answer:TCP In FTP, the well-known port ____ is used for the control connection and the wel l-known port ________ for the data connection. Answer:21; 20 In FTP, _______ is the service type used by the IP protocol because this is an i nteractive connection between a user (human) and a server. Answer:minimize delay For control connection, FTP uses the __________ character set Answer:NVT ASCII During an FTP session the control connection is opened _______. Answer:exactly once During an FTP session the data connection is opened _______. Answer:as many times as necessary In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. Answer:data structures In FTP, there are three types of _______: stream, block, and compressed. Answer:transmission modes In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer:file type In FTP, which category of commands is used to store and retrieve files? Answer:file transfer commands In FTP, which category of commands defines the port number for the data connecti on on the client site? Answer:port defining commands

In FTP, which category of commands sets the attributes (file type, data structur e, and transmission modes) of a file to be transferred? Answer:data formatting commands In FTP, which category of commands lets a user switch directories and create or delete directories? Answer: file management commands In FTP, when we _______, it is copied from the server to the client. Answer: retrieve a file / retrieve a list In FTP, when we _______, it is copied from the client to the server. Answer: store a file TFTP uses the services of ________. Answer: UDP In TFTP, what type of message is sent in response to an RRQ that fails to establ ish a connection? Answer: ERROR In TFTP, what type of message is sent to establish a connection to retrieve a fi le? Answer: RRQ In TFTP, which type of message is always a set number of bytes? Answer:ACK In TFTP, A DATA block is sent in response to a _______ message. Answer:RRQ / ACK In TFTP, a connection is terminated with a _______ block. Answer:DATA An unauthorized user tries to send a file to a server using TFTP. What should be the response of the server? Answer:ERROR In TFTP, the block number on a DATA message is 22. This always means _______. Answer:there were 21 previous blocks Which TFTP message contains a block number field? Answer: DATA / ACK In TFTP, connection termination is signaled by a DATA message with _______ bytes . Answer: 0 to 511 The flow-control mechanism in TFTP _______. Answer: requires an ACK for every DATA message In TFTP, if a message is _______, it is resent. Answer: damaged / lost In TFTP, if a duplicate DATA message is received, _______. Answer:the receiver discards the duplicate In TFTP, one symptom of the sorcerers apprentice bug is that _______. Answer:ACKS are duplicated / DATA messages are duplicated A ________ is part of a local hard drive, a special file with permission restric tions. Answer:none of the above When the sender and the receiver of an email are on different systems, we need o nly _____________. Answer:two UAs and one pair of MTAs When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________. Answer: two UAs, two pairs of MTAs, and a pair of MAAs ________ provides service to the user to make the process of sending and receiv ing a message easier. Answer: A UA Which of the following services is not provided by a UA? Answer: all are There are two types of user agents: _________ and ___________. Answer: command-driven and GUI-based The ________ usually contains the sender address, the receiver address, and ot her information.

Answer: envelope The message contains the ________ and the __________. Answer: header; body In the Internet, the email address consists of two parts: a _______ and a _____ __. Answer: local part; domain name _________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: MIME The actual mail transfer is done through ____________. Answer: MTAs The formal protocol that defines the MTA client and server in the Internet is c alled ___________. Answer: SMTP The process of transferring a mail message occurs in ________ phases. Answer: none of the above SMTP is a __________protocol. Answer: push The third stage in an email transfer needs a ________ protocol. Answer: pull The third stage in an email transfer uses a(n) ________ protocol. Answer: MAA Currently two message access protocols are available: _______ and _________. Answer: POP3; IMAP4 Which part of the mail created by the UA contains the sender and receiver names ? Answer: header In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits. Answer: base64 In the _______ encoding scheme, a non-ASCII character is sent as 3 characters. Answer: quoted-printable This command identifies the recipient of the mail. Answer: RCPT TO This command identifies the sender of the message. Answer: MAIL FROM The MIME _______ header uses text to describe the type of data in the body of t he message. Answer: content-description _______ is more powerful and complex than _______. Answer:IMAP4; POP3 SNMP defines the ___________________ to be sent from a manager to an agent and v ice versa. Answer:format of the packets A manager is a host that runs the SNMP _______ process. Answer:client An agent is a host or computer that runs the SNMP _______ process. Answer: server SNMP uses two other protocols:________ and _________. Answer: SMI; MIB ________ defines the general rules for naming objects, defining object types, a nd showing how to encode objects and values. Answer: SMI __________ creates a collection of named objects, their types, and their relat ionships to each other in an entity to be managed. Answer: SMI We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________. Answer: SMI We can compare the task of network management to the task of writing a program.

Both tasks need variable declarations. In network management this is handled by _________. Answer: MIB We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is h andled by _______. Answer: SMNP SMI emphasizes three attributes to handle an object: _____, ________, and _____ ____. Answer: name; data type; encoding method To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure Answer: tree All objects managed by SNMP are given an object identifier. The object identifie r always starts with _______. Answer:1.3.6.1.2.1 To define the data type, SMI uses fundamental _______ definitions and adds some new definitions. Answer:ASN.1 SMI has two broad categories of data type: _______ and _______. Answer: simple; structured The _______ data types are atomic data types. Answer: simple SMI defines two structured data types: ________ and _________. Answer: sequence; a sequence o SMI uses another standard, ___________, to encode data to be transmitted over th e network. Answer: BER The _________ ordering enables a manager to access a set of variables one after another by defining the first variable. Answer: lexicographic The GetRequest PDU is sent from the _______ to the __________ to retrieve the va lue of a variable or a set of variables. Answer: client; server The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest. Answer: server; client The Trap PDU is sent from the ______ to the _______ to report an event. Answer: server; client SNMP uses the services of UDP on two well-known ports, _______ and _______. Answer: 161; 162 _______ runs the SNMP client program; _______ runs the SNMP server program. Answer: manager; an agent INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI. Answer:ASN.1 Which of the following could be a legitimate MIB object identifier? Answer: 1.3.6.1.2.1.1 Which is a manager duty? Answer: Retrieve the value of an object defined in an agent. / Store the value of an object defined in an agent. For a 1-byte length field, what is the maximum value for the data length? Answer: 127 An object id defines a _______. Add a zero suffix to define the _______. Answer:variable; variable contents An SNMP agent can send _______ messages. Answer: Trap An SNMP agent can send _______ messages. Answer: Response The _______ field in the SNMP PDU is an offset that points to the variable in er

ror. Answer:error index The _______ field in the SNMP PDU reports an error in a response message. Answer: error status The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values. Answer: VarBindList _________ is a repository of information linked together from points all over th e world. A) The WWW The WWW today is a _______ client-server service, in which a client using a br owser can access a service using a server. Answer:distributed The _________ is a standard for specifying any kind of information on the Inter net. Answer:URL In a URL, the _______ is the client-server program used to retrieve the documen t. Answer: protocol In a URL, the ______ is the computer on which the information is located. Answer: host In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon. Answer: none of the above In a URL, the _______ is the full name of the file where the information is loc ated. Answer: path A cookie is made by the ________ and eaten by the _________. Answer: server; server The documents in the WWW can be grouped into ______ broad categories. Answer: three A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. Answer: static _____________ is a language for creating Web pages. Answer:HTML A _______ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic ___________ is a technology that creates and handles dynamic documents. Answer: CGI Dynamic documents are sometimes referred to as _________ dynamic documents. Answer: server-site For many applications, we need a program or a script to be run at the client si te. These are called _______________ documents. Answer: active One way to create an active document is to use __________. Answer: Java applets. Active documents are sometimes referred to as _________ dynamic documents. Answer: client-site HTTP uses the services of _________ on well-known port 80. Answer: TCP In HTTP, the first line in a request message is called a _______ line; the firs t line in the response message is called the ________ line. Answer: none of the above In a ___________ connection, one TCP connection is made for each request/respon se. Answer: nonpersistent In a ___________connection, the server leaves the connection open for more requ ests after sending a response.

Answer: persistent HTTP version 1.1 specifies a _________connection by default. Answer:persistent In HTTP, a _______ server is a computer that keeps copies of responses to recen t requests. Answer: proxy An HTTP request message always contains _______. Answer: a request line and a header Which of the following is present in both an HTTP request line and a status lin e? Answer: HTTP version number The HTTP request line contains a _______ method to request a document from the s erver. Answer: GET A user needs to send the server some information. The request line method is __ _____. Answer: POST The HTTP request line contains a _______ method to get information about a docu ment without retrieving the document itself. Answer: HEAD A response message always contains _______. Answer:a status line and a header An applet is _______ document application program. Answer: an active In the original ARPANET, _______ were directly connected together. answer: IMPs _______ was formed to connect universities with no defense ties. answer: CSNET This was the first network. answer: ARPANET Which organization has authority over interstate and international commerce in t he communications field? answer: FCC _______ are special-interest groups that quickly test, evaluate, and standardize new technologies. answer: Forums Which agency developed standards for physical connection interfaces and electron ic signaling specifications? answer: EIA _______ is the protocol suite for the current Internet. answer: TCP/IP A version of the _______ operating system included TCP/IP. answer: UNIX The _______ oversees the IETF and the IRTF. answer: IAB The _______ maintains and supports IAB. answer: ISOC _______ is the precursor to ICANN. answer: IANA _______ refers to the structure or format of the data, meaning the order in whic h they are presented.. answer: Syntax ________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. answer: Semantics _______ refers to two characteristics: when data should be sent and how fast it can be sent. answer: Timing An RFC, during its lifetime, falls into one of _______ maturity levels. A. 5 B.

2 C. 4 . D. None of the above answer: none of the above A proposed standard is elevated to ________ standard status after at least two s uccessful tries. answer: draft An RFC is labeled ________ if it must be implemented by all Internet systems. answer: required Why was the OSI model developed? answer: standards were needed to allow any two systems to communicate The _______ model shows how the network functions of a computer ought to be orga nized. answer: OSI The physical layer is concerned with the movement of _______ over the physical m edium. answer: bits The OSI model consists of _______ layers. answer: seven In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. answer: removed In the OSI model, when data is transmitted from device A to device B, the header from As layer 5 is read by Bs _______ layer. answer: session In the OSI model, which layer functions as a liaison between user support layers and network support layers? answer: transport layer In the OSI model, what is the main function of the transport layer? answer: process-to-process message delivery In the OSI model, encryption and decryption are functions of the ________ layer. answer: presentation In the OSI model, which of the following is an application layer service? A) network virtual terminal B) file transfer, access, and management C) mail service answer: all of the above When a host on network A sends a message to a host on network B, which address d oes the router look at? answer: logical To deliver a message to the correct application program running on a host, the _ ______ address must be consulted. answer: port IPv6 has _______ -bit addresses. answer: 128 ICMPv6 includes _______. A) IGMP B) ARP C) RARP answer: a and b The ______ layer is responsible for moving frames from one hop (node) to the nex t. answer: data link The ______ layer adds a header to the packet coming from the upper layer that in cludes the logical addresses of the sender and receiver. answer: network The_________ layer is responsible for the delivery of a message from one process to another. answer: transport The Internetworking Protocol (IP) is a ________ protocol. A) reliable B) connection-oriented C) both a and b answer: none of the above _______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. answer: UDP __________ provides full transport layer services to applications.

answer: TCP The ________ address, also known as the link address, is the address of a node a s defined by its LAN or WAN. answer: physical Ethernet uses a ______ physical address that is imprinted on the network interfa ce card (NIC). answer: 6-byte Which of the following can be an Ethernet physical address? answer: 07:01:02:01:2C:4B A port address in TCP/IP is ______ bits long. answer: 16 IP Version 5 was a proposal based on the ______ model. This version never went b eyond the proposal stage due to extensive layer changes and the projected expens e. answer: OSI 10BASE2 uses _______ cable while 10BASE5 uses _______. answer: thin coaxial, thick coaxial _______ specifies a physical star topology featuring a central hub and twisted-p air cable as the medium. answer: 10BASE-T Frame Relay operates in the _______. answer: physical and data link layers Which ATM layer has a 53-byte cell as an end product? answer: ATM The IP protocol uses the _______ sublayer. answer: AAL5 Repeaters function in the _______ layer. answer: physical Bridges function in the _______ layers. answer: physical and data link A bridge has access to the _______ address of a station on the same network. answer: physical Routers function in the _______ layers. answer: physical, data link, and network _______ has a higher transmission rate in the downstream direction than in the u pstream direction. answer: ADSL _______ is suitable for businesses that require comparable upstream and downstre am data rates. answer: SDSL _______ was designed as an alternative to the T-1 line. answer: HDSL A traditional TV network transmits signals _______. answer: downstream The second generation of cable networks is called a(n) _______ network. answer: HFC An HFC network uses _______ as the medium from the cable TV office to the fiber node. answer: optical fiber In an ESS the _______ station is mobile. answer: BSS In an ESS the _______ stations are part of a wired LAN. answer: AP SONET is a standard for _______ networks. answer: fiber-optic cable SONET is an acronym for _______ Network. answer: Synchronous Optical PPP is a _______ layer protocol. answer: physical and data link Identify the class of the following IP address: 4.5.6.7.

answer: class A Identify the class of the following IP address: 229.1.2.3. answer: class D Identify the class of the following IP address: 191.1.2.3. answer: class B Which of the following is true of the IP address 231.1.2.3? answer: The class is D. Which of the following is true of the IP address 192.0.0.10? answer: The network address is 192.0.0.0. Using the direct broadcast address, a _______ sends a packet to _______ on the n etwork. answer: router; all other hosts Using the limited broadcast address, a _______ sends a packet to _______ on the network. answer: host; all other hosts The loopback address is used to send a packet from the _______ to _______. A) host; all other hosts B) router; all other hosts C) host; a specific host answer: none of the above A host can get its IP address from its server by using _______ as the source add ress and _______ as the destination address. answer: 0.0.0.0; 255.255.255.255 A host with an IP address of 142.5.0.1 needs to test internal software. What is the destination address in the packet? answer: 127.1.1.1 What is the result of ANDing 255 and 15? answer: 15 What is the result of ANDing 0 and 15? answer: 0 What is the result of ANDing 254 and 15? answer: 14 What is the result of ANDing 192 and 65? answer: 64 A subnet mask in class A has 14 1s. How many subnets does it define? answer: 64 A subnet mask in class B has 19 1s. How many subnets does it define? answer: 8 A subnet mask in class C has 25 1s. How many subnets does it define? answer: 2 Which one is not a contiguous mask? answer: 255.148.0.0 Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? answer: 201.14.78.64 Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is th e subnet address? answer: 180.25.0.0 Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the s ubnet address? answer: 18.240.0.0 The subnet mask for a class C network is 255.255.255.192. How many subnetworks a re available? answer: 4 The subnet mask for a class B network is 255.255.224.0. How many subnetworks are available? answer: 8 The subnet mask for a class C network is 255.255.255.248. How many subnetworks a re available? answer: 16 The number of addresses in a class C block is _______.

answer: 256 The number of addresses in a class B block is _______. answer: 65,534 The number of addresses in a class A block is _______. answer: 16,777,216 An organization has been granted a class A address. If the organization has 256 subnets, how many addresses are available in each subnet (including special addr esses)? answer: 65,534 An organization has been granted a class B address. If the organization has 64 s ubnets, how many addresses are available in each subnet (including special addre sses)? answer: 1024 An organization has been granted a class C address. If the organization has 4 su bnets, how many addresses are available in each subnet (including special addres ses)? A) 4 B) 1024 C) 256 answer: none of the above In classless addressing, __________ is assigned to a organization. answer: a variable-length block The number of addresses assigned to an organization in classless addressing ____ ___. answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? A) 2.4.6.5 B) 2.4.6.15 C) 2.4.6.62 answer: none of the above Which address could be the beginning address of a block of 256 classless address es? answer: 2.4.6.0 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/27? answer: 12.2.2.64 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.76/10? answer: 12.0.0.0 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? answer: 12.2.2.112 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/24. answer: 256 Find the number of addresses in a block of classless addresses if one of the add resses is 12.2.2.7/30. answer: 4 What is the last address of a block of classless addresses if one of the address es is 12.2.2.127/28? answer: 12.2.2.127 What is the last address of a block of classless addresses if one of the address es is 12.2.2.6/30? answer: 12.2.2.7 In fixed-length subnetting, the number of subnets must _______. answer: be a power of 2 An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length? answer: /24 An organization is granted a block; one address is 2.2.2.64/25. If the subnet pr

efix length is /28, what is the maximum number of subnets? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.64/28. How many addresses are granted? answer: 16 An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? answer: 8 An organization is granted a block of classless addresses with the starting addr ess 199.34.32.0/27. How many addresses are granted? answer: 32 What is the default mask for class A in CIDR notation? answer: /8 What is the default mask for class B in CIDR notation? answer: /16 What is the default mask for class C in CIDR notation? answer: /24 In ________ addressing, when an address is given, we can find the beginning addr ess and the range of addresses. answer: classful In classless addressing, the ______ is another name for the common part of the a ddress range. answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . answer: suffix In classless addressing, the prefix length defines the _____________. answer: mask In a block, the prefix length is /22; what is the mask? answer: 255.255.252.0 In a block, the prefix length is /15; what is the mask? answer: 255.254.0.0 In a block, the mask is 255.255.192.0; what is the prefix length? answer: /18 In a block, the mask is 255.255.255.224; what is the prefix length? A) /20 B) /19 C) /20 answer: none of the above In _______ delivery, both the deliverer of the IP packet and the destination are on the same network. answer: a direct In _______ delivery, the deliverer of the IP packet and the destination are on d ifferent networks. answer: an indirect In _______ delivery, packets of a message are logically connected to one another . answer: a connection-oriented In _______ delivery, a packet is not connected to any other packet. answer: a connectionless In classful addressing, when a direct delivery is made, both the deliverer and r eceiver have the same _______. answer: netid In classful addressing, when an indirect delivery is made, the deliverer and rec eiver have _______. answer: different netids In _______ forwarding, the full IP address of a destination is given in the rout ing table. answer: host-specific In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in th e routing table. answer: default

In _______ forwarding, the destination address is a network address in the routi ng table. answer: network-specific In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information. answer: next-hop In ________ addressing, a typical forwarding module can be designed using three tables, one for each unicast class (A, B, C). answer: classful In classful addressing, the class of the address can be found by shifting the co py of the address ____ bits to the right. answer: 28 In classful addressing we need a routing table with at least ______ columns. answer: 3 In classless addressing, we need a routing table with at least _______ columns. answer: 4 The idea of address aggregation was designed to alleviate the increase in routin g table entries when using ________. answer: classless addressing The principle of ________ states that the routing table is sorted from the longe st mask to the shortest mask. answer: longest mask matching The use of hierarchy in routing tables can ________ the size of the routing tabl es. answer: reduce _______ deals with the issues of creating and maintaining routing tables. answer: Routing A _______ routing table contains information entered manually. answer: static A _______ routing table is updated periodically using one of the dynamic routing protocols. answer: dynamic The input and output ports of a router perform the ________ layer functions of t he router. answer: physical and data link The routing processor of a router performs the ________ layer functions of the r outer. answer: network The task of moving the packet from the input queue to the output queue in a rout er is done by _________. answer: switching fabrics A _______ address is an internetwork address with universal jurisdiction. answer: logical The logical addresses in the TCP/IP protocol suite are called _______ addresses. answer: IP A ________ is a local address. Its jurisdiction is over a local network. answer: physical If the sender is a host and wants to send a packet to another host on the same n etwork, the logical address that must be mapped to a physical address is ______. answer: the destination IP address in the datagram header If the sender is a host and wants to send a packet to another host on another ne twork, the logical address that must be mapped to a physical address is ______. answer: the IP address of the router found in the routing table The sender is a router that has received a datagram destined for a host on anoth er network. The logical address that must be mapped to a physical address is ___ ___. answer: the IP address of the router found in the routing table The sender is a router that has received a datagram destined for a host in the s ame network. The logical address that must be mapped to a physical address is __ ____.

answer: the destination IP address in the datagram header In _______, a table associating a logical address with a physical address is upd ated manually. answer: static mapping _______ is a dynamic mapping protocol in which a logical address is found for a given physical address. answer: RARP _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. answer: ARP The target hardware address on an Ethernet is _______ in an ARP request. answer: 0x000000000000 An ARP reply is normally _______. answer: unicast An ARP request is normally _______. answer: broadcast A technique called ______ is used to create a subnetting effect. answer: proxy ARP A _______ is an ARP that acts on behalf of a set of hosts. answer: proxy ARP A sender usually has more than one IP datagram to send to the same destination. It is inefficient to use the ARP protocol for each datagram destined for the sam e host or router. The solution is the _________. answer: ARP table The RARP reply packets are normally_________ . answer: unicast The ARP component that sends an ARP reply to the data link layer is the _______. answer: input module The ARP component that sends an IP packet to a queue is the _______. answer: output module The ________ protocol is the transmission mechanism used by the TCP/IP suite. answer: IP IP is _________ datagram protocol. answer: both a and b The term ________ means that IP provides no error checking or tracking. IP assum es the unreliability of the underlying layers and does its best to get a transmi ssion through to its destination, but with no guarantees. answer: best-effort delivery A best-effort delivery service such as IP includes _______. answer: none of the above An HLEN value of decimal 10 means _______. answer: there are 40 bytes in the header A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identification field is the same for all three datagrams. Which field or bit value unambiguously identifies the datagram as a fragment? answer: Fragment offset = 1000 If the fragment offset has a value of 100, it means that _______. answer: the first byte of the datagram is byte 800 What is needed to determine the number of the last byte of a fragment? answer: b and c (total length) The IP header size _______. answer: is 20 to 60 bytes long Packets in the IP layer are called _________ . answer: datagrams The total length field defines the total length of the datagram _________. answer: including the header When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______. answer: MTU

Which IP option is used if exactly four specific routers are to be visited by th e datagram? answer: strict source route For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field. answer: 0 The IP header field formerly known as the service type field is now called the _ ______ field. answer: differentiated services The _______ module takes fragments of a message and puts them back in order. answer: reassembly The _______ module sends out an IP packet, the next-hop address, and interface i nformation. answer: forwarding The _______ module discards datagrams with a TTL value of zero. answer: processing The output of the _______ module is an IP packet destined for an upper-layer pro tocol. answer: reassembly The _______ module consults the MTU table to determine the packet size necessary for transmission. answer: fragmentation The value of the ________ subfield in an option controls the presence of the opt ion in fragmentation. answer: copy The value of the ________ subfield defines the general purpose of an option. answer: class The value of the ________ subfield defines the types of an option. answer: number Only ______ end of option option can be used in a datagram. answer: one ICMP is a _________ layer protocol. answer: network ICMP messages are divided into two broad categories: answer: query and error reporting messages An ICMP message has _____ header and a variable-size data section. answer: an 8-byte Which of the following is true about ICMP messages? answer: none is true Which of the following is true about ICMP messages? answer: An ICMP error message may be generated only for the first fragment. Which of the following is true about ICMP messages? answer: No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0. If a host needs to synchronize its clock with another host, it sends a _______ m essage. answer: check node-to-node communication In error reporting the encapsulated ICMP packet goes to _______. answer: the original sender What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)? answer: type When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent. answer: time-exceeded When all fragments of a message have not been received within the designated amo unt of time, a _______ error message is sent. answer: time-exceeded Errors in the header or option fields of an IP datagram require a _______ error message.

answer: parameter-problem A _______ can learn about network _______ by sending out a router-solicitation p acket. answer: host, routers Who can send ICMP error-reporting messages? answer: a and b ( routers & destination hosts) One method to alert a source host of congestion is the _______ message. answer: source-quench A time-exceeded message is generated if _______. answer: a and b (the round-trip time between hosts is close to zero & fragments of a message do not arrive within a set time) To determine whether or not a node is reachable, _______ message can be sent. answer: an echo-request In calculating the time difference between two clocks, a negative value indicate s _______. answer: the destination clock lags behind the source clock An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encap sulates the ICMP packet contains _______. answer: the ICMP header plus 8 bytes of datagram A In the ICMP package, ICMP packets are the output of _______. answer: both the input and the output module ICMP packets are the input to _______. answer: only the input module IGMP is a companion to the ______ protocol. A) UDP B) TCP C) ICM answer: none of the above IGMP is _______ protocol. answer: a group management IGMP helps a ________ router create and update a list of loyal members related t o each router interface. answer: multicast IGMP operates __________. answer: locally An IGMP query is sent from a _______ to a _______. answer: router; host or router The _______ is used by a router in response to a received leave report. answer: special query message The least significant 23 bits in a 48-bit Ethernet address identify a ________. answer: multicast group The _______ field of the IGMP message is all zeros in a query message. answer: group address The _______ field of the IGMP message is 17 for a query message. answer: type A multicast message is sent from _______ to _______. answer: one source; multiple destinations In networks that do not support physical multicast addressing, multicasting can be accomplished through _______. answer: tunneling If four hosts on a network belong to the same group, a total of _______ sent in response to a general query message. answer: two membership reports are A process called _______ sends a multicast packet through WANs that do not suppo rt physical multicast addressing. answer: tunneling A group table entry is in the _______ state if there is no corresponding timer r unning. answer: IDLE A group table entry in the _______ state sends a request when its timer expires. answer: DELAYING The _______ module receives an IGMP report or query.

answer: input The _______ module sends out an IGMP report. answer: output The _______ module can create a new entry in the group table and start a timer. answer: group-joining The _______ module can decrement the reference count in the group table. answer: group-leaving In IGMP, a membership report is sent _______. answer: twice In IGMP, the general query message ___________________ group. answer: does not define a particular To prevent unnecessary traffic, IGMP uses ______________ strategy. answer: a delayed response To prevent unnecessary traffic, IGMP designates one router as the __________ for each network. answer: query router An IGMP packet is carried in an __________ packet. answer: IP The IP packet that carries an IGMP packet has a value of _______ in its protocol field. answer: 2 One of the responsibilities of the transport layer protocol is to create a _____ _ communication. answer: process-to-process UDP is called a ________________transport protocol. answer: connectionless, unreliable UDP does not add anything to the services of IP except for providing _______ com munication. answer: process-to-process UDP is an acronym for _______. answer: User Datagram Protocol Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm. answer: client-server The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ . answer: port addresses The ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These ar e the ___________ ports. answer: well-known The ports ranging from 1,024 to 49,151 are not assigned or controlled by ICANN. They are called ___________ ports. answer: registered The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports. answer: dynamic In the sending computer, UDP receives a data unit from the _______ layer. answer: application In the sending computer, UDP sends a data unit to the _______ layer. answer: IP UDP and TCP are both _______ layer protocols. answer: transport Which of the following functions does UDP perform? answer: process-to-process communication When the IP layer of a receiving host receives a datagram, _______. answer: a transport layer protocol takes over UDP needs the _______ address to deliver the user datagram to the correct applic ation process. answer: port A port address in UDP is _______ long.

answer: 16 Which of the following does UDP guarantee? A) flow control B) connection-orien ted delivery C) flow control answer: none of the above The source port address on the UDP user datagram header defines _______. answer: the process running on the sending computer The combination of an IP address and a port number is called a ____________. answer: socket address To use the services of UDP, we need ________ socket addresses. answer: two UDP packets are called __________ . answer: user datagrams UDP packets have a fixed-size header of _______ bytes. answer: 8 UDP packets are encapsulated in ___________ . answer: an IP datagram UDP uses ________ to handle outgoing user datagrams from multiple processes on o ne host. answer: multiplexing UDP uses _______ to handle incoming user datagrams that go to different processe s on the same host. answer: demultiplexing TCP is a __________protocol. answer: stream-oriented TCP allows the sending process to deliver data as a _______of bytes and allows t he receiving process to obtain data as a _________ of bytes.. answer: stream; stream Because the sending and the receiving processes may not write or read data at th e same speed, TCP ________. answer: uses buffers TCP groups a number of bytes together into a packet called a ___________. answer: segment TCP is a ___________ protocol.. answer: connection-oriented TCP is a(n) _______ transport protocol. answer: reliable TCP uses _________________ to check the safe and sound arrival of data. answer: an acknowledgment mechanism The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________. answer: randomly generated number TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . answer: first Communication in TCP is ___________. answer: full-duplex The value of the acknowledgment field in a segment defines the number of the ___ ___byte a party expects to receive. answer: next The acknowledgment number is ________. answer: cumulative The value of window size is determined by _________. answer: the receiver The inclusion of the checksum in the TCP segment is ________. answer: mandatory A TCP segment is encapsulated in __________. answer: an IP datagram Connection establishment in TCP is called __________ handshaking. A) two-way B) four-way C) one-way

answer: none of the above A SYN segment cannot carry data; it consumes _____ sequence number(s). answer: one A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers. A) no B) three C) two answer: none of the above An ACK segment, if carrying no data, consumes ______ sequence number(s). answer: no The connection establishment procedure in TCP is susceptible to a serious securi ty problem called the _________ attack. answer: SYN flooding The SYN flooding attack belongs to a group of security attacks known as a _____ attack. answer: denial of service The FIN segment consumes ____ sequence numbers if it does not carry data. A) two B) three C) no answer: none of the above The FIN + ACK segment consumes _____ sequence number(s) if it does not carry dat a. answer: one In TCP, one end can stop sending data while still receiving data. This is called a ______ . answer: half-close A(n) _________ machine is a machine that goes through a limited number of states . answer: finite state A common value for MSL is between___ seconds and ___ minute(s). answer: 30; 1 __________ control regulates the amount of data a source can send before receivi ng an acknowledgment from the destination.. answer: Flow To accomplish flow control, TCP uses a ___________ window protocol. answer: sliding TCP sliding windows are __________ oriented. answer: byte In TCP, the size of the window is the ________ of rwnd and cwnd. answer: minimum In TCP, the window should not be _________. answer: shrunk In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down. answer: one A serious problem can arise in the sliding window operation when either the send ing application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______. answer: silly window syndrome Nagle's algorithm can solve the silly window syndrome created by the _________. answer: sender Clark's solution can solve the silly window syndrome created by the _________. answer: receiver Delayed acknowledgment can solve the silly window syndrome created by the ______ ___. answer: receiver ACK segments consume _______ sequence number(s) and _______ acknowledged. answer: no; are not In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived. answer: three In TCP, ________ retransmission timer is set for an ACK segment. answer: no

TCP delivers _______ out-of-order segments to the process. answer: no Lost acknowledgments may create a _______ if they are not handled properly. answer: deadlock In the ________ algorithm the size of the congestion window increases exponentia lly until it reaches a threshold. answer: slow start In the __________ algorithm the size of the congestion window increases additive ly until congestion is detected. answer: congestion avoidance In the congestion detection algorithm, if detection is by a time-out, a new ____ ___ phase starts. answer: slow start In the congestion detection algorithm, if detection is by three ACKs, a new ____ ___ phase starts. answer: congestion avoidance In TCP, there can be ______ RTT measurement(s) in progress at any time. answer: only one The value of the window scale factor can be determined during __________. answer: connection establishment IP is responsible for _______ communication while TCP is responsible for _______ communication. answer: host-to-host; process-to-process If a segment carries data along with an acknowledgment, this is called _______. answer: piggybacking Multiply the header length field by _______ to find the total number of bytes in the TCP header. answer: 4 Urgent data requires the urgent pointer field as well as the URG bit in the ____ ___ field. answer: control Which of the following is not a valid acknowledgment number? answer: 232 The options field of the TCP header ranges from 0 to _______ bytes. answer: 40 Which option defines the maximum number of bytes in a TCP segment? answer: maximum segment size If the ACK value is 200, then byte _______ has been received successfully. answer: 199 The _______ timer prevents a long idle connection between two TCPs. answer: keepalive The _______ timer is needed to handle the zero window-size advertisement. answer: persistence Karn's algorithm is used in calculations by the _______ timer. answer: retransmission In the _______ state, the client TCP has closed its connection to the server. answer: FIN-WAIT-2 A special segment called a probe is sent by a sending TCP when the _______ timer goes off. answer: persistence Stream Control Transmission Protocol (SCTP) is a new _____________protocol. answer: reliable, message-oriented SCTP allows __________ service in each association. answer: multistream SCTP association allows _____________ for each end. answer: multiple IP addresses In SCTP, a data chunk is numbered using ________. answer: a TSN To distinguish between different streams, SCTP uses ___________. answer: an SI

To distinguish between different data chunks belonging to the same stream, SCTP uses ___________. answer: SSNs TCP has ____________; SCTP has ____________. answer: segments; packets The control information in SCTP is included in the ________. answer: control chunks An SCTP packet can carry __________. answer: several data chunks Options in SCTP ____________________________. answer: are handled by defining new chunk types The general header in SCTP is _______ bytes. answer: 12 An SCTP sequence number (TSN) is located in the _______. answer: data chunk header In SCTP, the acknowledgment number and window size are part of each ________. answer: control chunk There is no need for a header length field in SCTP because ________________. answer: both a and b (there are no options in the general header & the size of t he header is fixed) The checksum in SCTP is ________ bits. answer: 32 The association identifier in SCTP is __________________ . answer: a unique verification tag The association identifier in SCTP cannot be a combination of logical and port a ddresses because of ________________. answer: multihoming service In SCTP, control information and data information are carried in _______ chunks. answer: different chunks Control chunks in SCTP ___________________. answer: never use a TSN, IS, or SSN number In SCTP, TSN is a cumulative number identifying the _______; SI defines the ____ ___; SSN defines the ________. answer: association; stream; chunks in a stream In SCTP, acknowledgment numbers are used to acknowledge _____________. answer: only data chunks In an SCTP packet, control chunks come ___________ data chunks. answer: before In SCTP, chunks need to terminate on a _______boundary. answer: 32-bit In SCTP, the number of padding bytes are _________ in the value of the length fi eld. answer: not included In SCTP, a DATA chunk ______carry data belonging to more than one message. answer: cannot In SCTP, a message ________ split into several chunks. answer: can be In SCTP, the data field of the DATA chunk must carry at least _________ byte of data, which means the value of length field cannot be less than ___________. answer: 1; 17 In SCTP, ___________ can be carried in a packet that carries an INIT chunk. answer: no other chunk A connection in SCTP is called an ____________. answer: association The acknowledgment in SCTP defines the cumulative TSN, the TSN of the __________ __ . answer: last data chunk received in order A DATA chunk arrives with its B/E bits equal to 00. It is ___________. answer: the middle fragment A DATA chunk arrives with its B/E bits equal to 01. It is ___________.

answer: the last fragment A DATA chunk arrives with its B/E bits equal to 10. It is ___________. answer: the first fragment A DATA chunk arrives with its B/E bits equal to 11. It is ___________. answer: not fragmented The number of states in the state transition diagram of SCTP is __________ the n umber of states in the state transition diagram of TCP. answer: less than Which chunk is not involved in association establishment? answer: SACK chunk Which chunk probes the condition of an association? answer: HEARTBEAT chunk The _______ chunk is sent when an end point finds an error in a received packet. answer: ERROR In SCTP, duplicate messages are _______. answer: b and c (tracked) SCTP strategies for congestion control include _______. A) exponent ial increase B) additive increase C) multiplicative decrease answer: all of the above We can divide audio and video services into _______ broad categories. answer: three ________ audio/video refers to on-demand requests for compressed audio/video fil es. answer: Streaming stored ___________ audio/video refers to the broadcasting of radio and TV programs thro ugh the Internet. answer: Streaming live _________ audio/video refers to the use of the Internet for interactive audio/vi deo applications. answer: Interactive According to the Nyquist theorem, we need to sample an analog signal ________tim es the highest frequency. answer: two In ________ encoding, the differences between the samples are encoded instead of encoding all the sampled values. answer: predictive __________ encoding is based on the science of psychoacoustics, which is the stu dy of how people perceive sound. answer: Perceptual ____________ is used to compress images. answer: JPEG ____________ is used to compress video. answer: MPEG The first phase of JPEG is ___________. answer: DCT transformation The second phase of JPEG is ___________. answer: quantization The third phase of JPEG is ___________. answer: data compression Jitter is introduced in real-time data by the _______________. answer: delay between packets To prevent _________, we can timestamp the packets and separate the arrival time from the playback time. answer: jitter A ________buffer is required for real-time traffic. answer: playback A __________on each packet is required for real-time traffic. answer: both a and b (timestamp $ sequence number) Real-time traffic needs the support of ____________. answer: multicasting

__________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network. answer: Translation __________ means combining several streams of traffic into one stream. answer: Mixing _________ is not suitable for interactive multimedia traffic because it retransm its packets in case of errors. answer: TCP __________ is the protocol designed to handle real-time traffic on the Internet. answer: RTP RTP uses a temporary even-numbered _______ port. answer: UDP ___________ is a protocol for controlling the flow and quality of data. answer: RTCP RTCP uses an odd-numbered _______ port number that follows the port number selec ted for RTP. answer: UDP ___________ is an application protocol that establishes, manages, and terminates a multimedia session answer: SIP _______ is a standard to allow telephones on the public telephone network to tal k to computers connected to the Internet. answer: H.323 A real-time video performance lasts 10 min. If there is jitter in the system, th e viewer spends _______ minutes watching the performance. answer: more than 10 A _______ shows the time a packet was produced relative to the first or previous packet. answer: timestamp _______ are used to number the packets of a real-time transmission. answer: Sequence numbers In a real-time video conference, data from the server is _______ to the client s ites. answer: multicast A _______ adds signals from different sources to create a single signal. answer: mixer A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal. answer: translator An RTP packet is encapsulated in _______. answer: a UDP user datagram When there is more than one source, the _______ identifier defines the mixer. answer: synchronization source Private networks, hybrid networks, and virtual private networks can provide ____ _____ for organizations answer: privacy Both private and hybrid networks have a major drawback: _________. answer: cost A _______ network allows an organization to have its own private internet and, a t the same time, access the global Internet. answer: hybrid When an organization uses a private network, it _______________. answer: can use a block of addresses without permission from the Internet author ities VPN is a network that is _______ but ________. answer: private; virtual A VPN is physically ________ but virtually ________. answer: public; private VPN technology uses two simultaneous techniques to guarantee privacy for an orga nization: ________ and ___________.

answer: IPSec; tunneling ____________ means that each IP datagram destined for private use in the organiz ation must be encapsulated in another datagram. answer: Tunneling __________ technology allows a site to use a set of private addresses for intern al communication and a set of global Internet addresses for communication with a nother site. answer: NAT Using _______, all of the outgoing packets go through the corresponding router, which replaces the source address in the packet with the appropriate global addr ess. answer: NAT An _______ is a private network with no external access that uses the TCP/IP pro tocol suite. answer: intranet An _______ is a private network with limited external access that uses the TCP/I P protocol suite. answer: extranet A _______ network is totally isolated from the global Internet. answer: private A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. answer: hybrid A VPN can use _______ to guarantee privacy. answer: both a and b (IPSec & tunneling) Tunneling is a technique in which the IP datagram is first _______ and then ____ ___. answer: encrypted; encapsulated in another datagram _______ is a technology using a set of global Internet addresses and a set of pr ivate addresses. answer: NAT On a network that uses NAT, the _______ has a translation table. answer: router On a network that uses NAT, _______ initiates the communication. answer: an internal host On a network that uses NAT, the router can use _______ global address(es). answer: a pool of An IPv6 address is _________ bits long. answer: 128 In IPv6, options are inserted between the _________ and the ___________ data. answer: base header; upper-layer data IPv6 allows _________ security provisions than IPv4. answer: more An IPv6 address consists of ________ bytes (octets); answer: 16 To make addresses more readable, IPv6 specifies ____________notation. answer: hexadecimal colon In hexadecimal colon notation, a 128-bit address is divided into _______ section s, each _____ hexadecimal digits in length. answer: 8: 4 An IPv6 address can have up to __________ colons. answer: 7 An IPv6 address can have up to __________ hexadecimal digits. answer: 32 If an IPv6 address has digits of ________, we can abbreviate the address. answer: 0s In IPv6, _______ address defines a single computer. answer: a unicast In IPv6, ____ address defines a group of computers with addresses that have the same prefix.

answer: an anycast _________ address defines a group of computers. answer: A multicast In IPv6, the ________ prefix defines the purpose of the address. answer: type In IPv6, the___________ address is generally used by a normal host as a unicast address. answer: provider-based unicast A _________ address comprises 80 bits of zero, followed by 16 bits of one, follo wed by the 32-bit IPv4 address. answer: mapped A ___________ address is an address of 96 bits of zero followed by 32 bits of IP v4 address. A) link local B) site local C) mapped answer: none of the above A _______ address is used if a LAN uses the Internet protocols but is not connec ted to the Internet for security reasons. answer: link local The ______ address is used if a site with several networks uses the Internet pro tocols but is not connected to the Internet for security reasons. answer: site local Which of the following is a necessary part of the IPv6 datagram? answer: a and b (base header & data packet from the upper layer) The _______ field in the base header restricts the lifetime of a datagram. answer: hop limit When a datagram needs to be discarded in a congested network, the decision is ba sed on the _______ field in the base header. answer: priority The _______ field in the base header and the sender IP address combine to indica te a unique path identifier for a specific flow of data. answer: flow label In the _______ extension header, the destination address changes from router to router. answer: source routing To request the physical address of a host whose IP address is known, a _______ m essage is sent. answer: neighbor-solicitation If a host needs information about routers on the network, it sends a _______ mes sage. answer: router-solicitation The ARP function in version 4 is part of _______ in version 6. answer: neighbor solicitation and advertisement The IGMP functions in version 4 are part of _______ in version 6. answer: group membership To join a group, a host sends a _______. answer: group-membership report The purpose of echo request and echo reply is to _______. answer: check node-to-node communication A router sends a _______ message to the host to monitor group membership. answer: query In error reporting the encapsulated ICMP packet goes to _______. answer: the source In error reporting, a destination can send a _______ message if an option is not recognized. answer: parameter-problem An MTU field is found on the _______ error message to inform the sender about pa cket size. answer: none of the above When all fragments of a message have not been received within the designated amo unt of time, a _______ error message is sent. answer: time-exceeded

When the hop count field reaches zero and the destination has not been reached, a _______ error message is sent. answer: time-exceeded Errors in the header or option fields of an IP datagram require a _______ error message. answer: parameter-problem If a member of a group wishes to terminate membership, it can _______ in respons e to a group membership query. answer: send a group membership termination In version 6, an independent protocol called _______ is eliminated. answer: IGMP The _______ packet contains information about a router. answer: router advertisement When a host has the _______ address of a host but needs the _______ address, it uses a neighbor solicitation packet. answer: IP; physical A router can send a _______ message to a host to inform it of a more efficient p ath. answer: redirection Which version 4 protocols are still viable and known by their same names in vers ion 6? A) IGMP B) ARP C) RARP answer: none of the above Which error-reporting message from version 4 has been eliminated in version 6? answer: source quench Which error-reporting message is found in version 6 but not in version 4? answer: packet too big In cryptography, the encryption/decryption algorithms are ________; the keys are ________. answer: public; secret In __________cryptography, the same key is used by the sender (for encryption) a nd the receiver (for decryption). answer: symmetric-key In _________ cryptography, the same key is used in both directions. answer: symmetric-key The DES cipher uses the same concept as the _________ cipher, but the encryption / decryption algorithm is much more complex. answer: Caesar _________ cryptography is often used for long messages. answer: Symmetric-key ___________ algorithms are more efficient for short messages. answer: Asymmetric-key __________means that the sender and the receiver expect confidentiality. answer: none of the above ___________ means that the data must arrive at the receiver exactly as they were sent. answer: Message integrity ______________ means that the receiver needs to be sure of the sender identity a nd that an imposter has not sent the message. answer: Message authentication ______________ can provide authentication, integrity, and nonrepudiation for a m essage. answer: Digital signature Digital signature does not provide _________. answer: privacy In ___________, the entity identity is verified once for the entire duration of system access. answer: entity authentication The symmetric (shared) key in the Diffie-Hellman protocol is ____________. answer: K = Gxy mod N In __________ cryptography, everyone has access to everyones public key.

answer: asymmetric-key ___________servers are involved in the Kerberos protocol. answer: Three In Kerberos, the _______ is the KDC. answer: AS In Kerberos, the _______ issues the ticket for the real server. answer: TGS In Kerberos, the ___________ provides services for the entity. answer: real server Kerberos allows the global distribution of ASs and TGSs, with each system called a ________ answer: realm IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level. answer: network IPSec requires a logical connection between two hosts using a signaling protocol called ____________. answer: SA IPSec operates at two different modes: _________ mode and _________mode. answer: transport; tunnel In the _________ mode, the IPSec header is added between the IP header and the r est of the packet. answer: transport In the ________ mode, the IPSec header is placed in front of the original IP hea der. answer: tunnel IPSec defines two protocols: _________ and __________. A) AH: SSP B) ESP; SSP C) AH: EH answer: none of the above The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet. answer: AH The _______ protocol provides message authentication and integrity, but not priv acy. answer: AH The _______ protocol provides message authentication, integrity, and privacy. answer: ESP The _______ was designed to provide security at the transport layer. answer: TLS _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email. A) AH B) ESP C) TLS answer: none of the above A packet-filter firewall filters at the ________ or ___________ layer. answer: network; transport A proxy firewall filters at the __________ layer. answer: application Before a message is encrypted, it is called _______. answer: plaintext After a message is encrypted, it is called _______. answer: ciphertext If 20 people need to communicate using symmetric-key cryptography, _______ symme tric keys are needed. answer: 190 In the asymmetric-key method of cryptography, which key is publicly known? answer: encryption key only In the asymmetric-key method of cryptography, the receiver has possession of the _______. answer: private key The RSA algorithm uses _______ cryptography method. answer: an asymmetric-key

If user A wants to send an encrypted message to user B, the plaintext is encrypt ed with the public key of _______. answer: user B In the digital signature technique when the whole message is signed using an asy mmetric key, the sender of the message uses _______ to sign the message. answer: his or her own private key In the digital signature technique when the whole message is signed using an asy mmetric key, the receiver of the message uses _______ to verify the signature. answer: the senders public key A _______ is a trusted third party that solves the problem of symmetric-key dist ribution. answer: KDC A _______ certifies the binding between a public key and its owner. answer: CA In a _______ attack, a message captured by an intruder is illegally sent a secon d time. answer: replay A _______ is a large number used only once that helps distinguish a fresh authen tication request from a repeated one. answer: nonce In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are p ublic numbers. answer: Diffie-Hellman In a _______ attack, an intruder comes between two communicating parties, interc epting and replying to their messages. answer: man-in-the-middle _______ is an authentication protocol that needs an authentication server and a ticket-granting server. answer: Kerberos static table is one _______. Answer: with manual entries A dynamic table is one _______. Answer: which is updated automatically For purposes of routing, the Internet is divided into ___________. Answer: autonomous systems ____________ is a group of networks and routers under the authority of a single administration. Answer: An autonomous system Routing inside an autonomous system is referred to as _______________. Answer:intradomain routing Routing between autonomous systems is referred to as ____________. Answer: interdomain routing In _______ routing, the least cost route between any two nodes is the route with the minimum distance. Answer: distance vector In ________, each node maintains a vector (table) of minimum distances to every node. Answer: distance vector In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change. Answer: its immediate neighbors The Routing Information Protocol (RIP) is an intradomain routing based on ______ ___ routing. Answer: distance vector The metric used by _______ is the hop count. Answer:RIP In RIP, the ________ timer controls the advertising of regular update messages. Answer:periodic In RIP, the ________ timer is used to purge invalid routes from the table. Answer:garbage collection

In RIP, the ________ timer controls the validity of the route. Answer:expiration RIP uses the services of _______. Answer:UDP The _________ routing uses the Dijkstra algorithm to build a routing table. Answer:link state The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing. Answer:link state The _______ protocol allows the administrator to assign a cost, called the metri c, to each route. Answer:OSPF In OSPF, a ________ link connects two routers without any other host or router i n between. Answer: point-to-point In OSPF, a _______ link is a network with several routers attached to it. Answer:transient In OSPF, a ________ link is a network is connected to only one router. In OSPF, when the link between two routers is broken, the administration may cre ate a _________ link between them using a longer path that probably goes through several routers. Answer:none of the above In OSPF, a ________ defines the links of a true router. Answer:router link In OSPF, a ________ defines the links of a network. Answer:network link In OSPF, an area border router advertises a ____________ LSA. Answer:summary link to network OSPF uses the _______ message to create neighborhood relationships and to test t he reachability of neighbors. Answer:none of the above In OSPF, the ________ message does not contain complete database information; it only gives an outline, the title of each line in the database. Answer:database description In OSPF, a _________ message is sent by a router that needs information about a specific route or routes. Answer:link state request In ________ routing, we assume that there is one node (or more) in each autonomo us system that acts on behalf of the entire autonomous system. Answer:path vector ___________ is an interdomain routing protocol using path vector routing. Answer:BGP BGP can have two types of sessions: _______ and ________ sessions. Answer:E-BGP; I-BGP To create a neighborhood relationship, a router running BGP sends an ________ me ssage. Answer:open In BGP, the _______ message is used by a router to withdraw destinations that ha ve been advertised previously, or to announce a route to a new destination, or b oth. Answer:keepalive The routers running the BGP protocols exchange _______ messages regularly to tel l each other that they are alive. Answer:keepalive In BGP, a _______ message is sent by a router whenever an error condition is det ected or a router wants to close the connection. Answer:none of the above BGP messages are encapsulated in _______. Answer:TCP segments An area is _______.

Answer:part of an AS A one-to-all communication between one source and all hosts on a network is clas sified as a _______ communication. Answer:broadcast A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication. Answer:multicast A one-to-one communication between one source and one destination is classified as a _______ communication. Answer: none of the above In ______, the router forwards the received packet through only one of its inter faces. Answer:unicasting In _______, the router may forward the received packet through several of its in terfaces. Answer:multicasting Emulation of ________ through ___________ is not efficient and may create long d elays. Answer:multicasting; multiple unicasting In unicast routing, each router in the domain has a table that defines a ______ path tree to possible destinations. Answer:shortest In multicast routing, each involved router needs to construct a ________ path tr ee for each group. Answer:shortest In the _______ tree approach, each router needs to have one shortest path tree f or each group. Answer: source-based In the group-shared tree approach, _________ involved in multicasting. Answer:only the core router is Multicast link state routing uses the _______ tree approach. Answer: source-based The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the O SPF protocol that uses multicast routing to create source-based trees. The proto col is based on _______ routing. Answer:link state MOSPF is a _______ protocol. Answer:data-driven _________ broadcasts packets, but creates loops in the systems. Answer:Flooding In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router. Answer:shortest RPF eliminates the ________ in the flooding process. Answer: none of the above RPF guarantees that each network receives only ____ of the multicast packet. Answer:none of the above RPB creates a shortest path _______ tree from the source to each destination. Answer:broadcast RPB guarantees that each destination receives _________ of the packet. Answer:one copy In ________, the multicast packet must reach only those networks that have activ e members for that particular group. Answer:RPM ______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes. Answer:RPM; RPB __________ is an implementation of multicast distance vector routing. It is a so urce-based routing protocol, based on RIP. Answer:DVMRP

DVMRP is a ________routing protocol, based on RIP. Answer:source-based Pruning and grafting are strategies used in _______. Answer:RPM A _______ message tells an upstream router to stop sending multicast messages fo r a specific group through a specific router. Answer:prune A _______ message tells an upstream router to start sending multicast messages f or a specific group through a specific router. Answer:graft CBT is a ________ protocol that uses a core as the root of the tree. Answer:group-shared PIM-DM is used in a _______ multicast environment, such as a LAN. Answer: dense PIM-SM is used in a _______multicast environment such as a WAN. Answer:sparse In _______, a logical tunnel is established by encapsulating the multicast packe t inside a unicast packet. Answer:MBONE The Bootstrap Protocol (BOOTP) is a client/server protocol designed to provide ________ of information for a diskless computer or a computer that is booted for the first time. Answer:four pieces The BOOTP client and server can be on _______. Answer:both a and b If BOOTP client and server are on different networks, there is a need for an in termediary called a _______. Answer:relay agent In BOOTP, the client uses ________ port and the server uses _________port. Answer:a well-known; a well-known In BOOTP, the server uses the well-known port _______; the client uses the well -known port _______. Answer:67; 68 In BOOTP, the client often needs to use ________ to obtain the complete informat ion it needs. Answer:TFTP BOOTP uses the services of _______. Answer:UDP BOOTP is a ________ configuration protocol. Answer:static DHCP is a _______ configuration protocol. Answer:both a and b DHCP can be configured ___________. Answer:manually / automatically DHCP client can be in one of ___________ states. Answer:6 When the DHCP client first starts, it is in the _______ state. Answer:initializing After sending the DHCPDISCOVER message, the client goes to the _______ state. Answer:selecting The default lease time of an IP address offer is ________. Answer:1 hour After sending the DHCPDISCOVER message, the client goes to the _______ state. Answer:selecting _______ is backward compatible with __________. Answer:DHCP; BOOTP After the selecting state, a DHCP client can go to the ________state. Answer:requesting After the rebinding state, a DHCP client can go to the __________ state. Answer:initializing / bound

After the bound state, a DHCP client can go to the __________ state. Answer:renewing After the renewing state, a DHCP client can go to the __________ state. Answer:rebinding In a _______ name space, a name is assigned to an address. A name in this space is a sequence of characters without structure. Answer: flat In a _________name space, each name is made of several parts. Answer:hierarchical To have a hierarchical name space, a ______________ was designed. Answer: domain name space In the DNS, the names are defined in ___________ structure. Answer:an inverted-tree Each node in the tree has a _______, which is a string with a maximum of ___ ch aracters. Answer:label; 63 The root of the DNS tree is _______. Answer: an empty string A full domain name is a sequence of labels separated by ________. Answer: dots If a label is terminated by a null string, it is called a __________. Answer: FQDN If a label is not terminated by a null string, it is called a __________. Answer: PQDN A _________ is a subtree of the domain name space. Answer: domain What a server is responsible for or has authority over is called a _________. Answer: zone A _______ is a server whose zone consists of the whole tree. Answer: root server A ________ server loads all information from the disk file. Answer: primary A ________ server loads all information from the primary server. Answer: secondary When the secondary downloads information from the primary, it is called ______ t ransfer. Answer: zone In the Internet, the domain name space (tree) is divided into _______ different sections: Answer: three The _______ domains define registered hosts according to their generic behavior. Answer: generic The first level in the generic domains section allows ______ possible labels. Answer: none of the above The ____________ domain section uses two-character country abbreviations. Answer:country The _________ domain is used to map an address to a name. Answer: inverse In __________ resolution, the resolver expects the server to supply the final an swer. Answer:recursive In __________ resolution, the server returns the IP address of the server that i t thinks can resolve the query. Answer:iterative In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: edu In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer:chal A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DN

S hierarchical tree. (The root is level one.) Answer: fifth A pointer query involves the _______ domain. Answer:inverse DNS can use the services of ________ using the well-known port 53. Answer: UDP / TCP TELNET is an abbreviation for ____________. Answer:terminal network is a ________ client-server application program. Answer:general-purpose When a user logs into a local time-sharing system, it is called ________ login. Answer:local When a user wants to access an application program or utility located on a remot e machine, he or she performs ___________ login. Answer:remote NVT uses two sets of characters, one for _____and one for __________. Answer:data; control For data, NVT uses US ASCII characters with the highest order bit set to ______. Answer:0 For control, NVT uses US ASCII characters with the highest order bit set to ___ ___. Answer:1 TELNET uses only one TCP connection. The server uses ________ port and the clien t uses ________ port. Answer:a well-known; an ephemeral To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________. Answer:IAC To make control characters effective in special situations, TELNET uses ______ s ignaling. Answer:out-of-band In the _______ mode, the echoing is done by the client. Answer:default In the _______ mode, each character typed is sent by the client to the server. Answer:characte In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client. Answer:line The _______ is software residing on the remote system that allows the remote sys tem to receive characters from a TELNET server. Answer: pseudoterminal driver The _______ translates local characters into NVT form. Answer:TELNET client The _______ translates NVT characters into a form acceptable by the remote opera ting system. Answer:TELNET server If the sender wants to disable an option, it sends a _______ command. Answer:WONT If the sender wants to enable an option, it sends a _______ command. Answer:WIL If the sender wants an option disabled by the receiver, it sends a _______ comma nd. Answer:DONT If the sender wants an option enabled by the receiver, it sends a _______ comman d. Answer:DO _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another. Answer:none of the above

FTP uses the services of ________. Answer:TCP In FTP, the well-known port ____ is used for the control connection and the wel l-known port ________ for the data connection. Answer:21; 20 In FTP, _______ is the service type used by the IP protocol because this is an i nteractive connection between a user (human) and a server. Answer:minimize delay For control connection, FTP uses the __________ character set Answer:NVT ASCII During an FTP session the control connection is opened _______. Answer:exactly once During an FTP session the data connection is opened _______. Answer:as many times as necessary In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. Answer:data structures In FTP, there are three types of _______: stream, block, and compressed. Answer:transmission modes In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer:file type In FTP, which category of commands is used to store and retrieve files? Answer:file transfer commands In FTP, which category of commands defines the port number for the data connecti on on the client site? Answer:port defining commands In FTP, which category of commands sets the attributes (file type, data structur e, and transmission modes) of a file to be transferred? Answer:data formatting commands In FTP, which category of commands lets a user switch directories and create or delete directories? Answer: file management commands In FTP, when we _______, it is copied from the server to the client. Answer: retrieve a file / retrieve a list In FTP, when we _______, it is copied from the client to the server. Answer: store a file TFTP uses the services of ________. Answer: UDP In TFTP, what type of message is sent in response to an RRQ that fails to establ ish a connection? Answer: ERROR In TFTP, what type of message is sent to establish a connection to retrieve a fi le? Answer: RRQ In TFTP, which type of message is always a set number of bytes? Answer:ACK In TFTP, A DATA block is sent in response to a _______ message. Answer:RRQ / ACK In TFTP, a connection is terminated with a _______ block. Answer:DATA An unauthorized user tries to send a file to a server using TFTP. What should be the response of the server? Answer:ERROR In TFTP, the block number on a DATA message is 22. This always means _______. Answer:there were 21 previous blocks Which TFTP message contains a block number field? Answer: DATA / ACK In TFTP, connection termination is signaled by a DATA message with _______ bytes . Answer: 0 to 511

The flow-control mechanism in TFTP _______. Answer: requires an ACK for every DATA message In TFTP, if a message is _______, it is resent. Answer: damaged / lost In TFTP, if a duplicate DATA message is received, _______. Answer:the receiver discards the duplicate In TFTP, one symptom of the sorcerers apprentice bug is that _______. Answer:ACKS are duplicated / DATA messages are duplicated A ________ is part of a local hard drive, a special file with permission restric tions. Answer:none of the above When the sender and the receiver of an email are on different systems, we need o nly _____________. Answer:two UAs and one pair of MTAs When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________. Answer: two UAs, two pairs of MTAs, and a pair of MAAs ________ provides service to the user to make the process of sending and receiv ing a message easier. Answer: A UA Which of the following services is not provided by a UA? Answer: all are There are two types of user agents: _________ and ___________. Answer: command-driven and GUI-based The ________ usually contains the sender address, the receiver address, and ot her information. Answer: envelope The message contains the ________ and the __________. Answer: header; body In the Internet, the email address consists of two parts: a _______ and a _____ __. Answer: local part; domain name _________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: MIME The actual mail transfer is done through ____________. Answer: MTAs The formal protocol that defines the MTA client and server in the Internet is c alled ___________. Answer: SMTP The process of transferring a mail message occurs in ________ phases. Answer: none of the above SMTP is a __________protocol. Answer: push The third stage in an email transfer needs a ________ protocol. Answer: pull The third stage in an email transfer uses a(n) ________ protocol. Answer: MAA Currently two message access protocols are available: _______ and _________. Answer: POP3; IMAP4 Which part of the mail created by the UA contains the sender and receiver names ? Answer: header In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits. Answer: base64 In the _______ encoding scheme, a non-ASCII character is sent as 3 characters. Answer: quoted-printable This command identifies the recipient of the mail. Answer: RCPT TO

This command identifies the sender of the message. Answer: MAIL FROM The MIME _______ header uses text to describe the type of data in the body of t he message. Answer: content-description _______ is more powerful and complex than _______. Answer:IMAP4; POP3 SNMP defines the ___________________ to be sent from a manager to an agent and v ice versa. Answer:format of the packets A manager is a host that runs the SNMP _______ process. Answer:client An agent is a host or computer that runs the SNMP _______ process. Answer: server SNMP uses two other protocols:________ and _________. Answer: SMI; MIB ________ defines the general rules for naming objects, defining object types, a nd showing how to encode objects and values. Answer: SMI __________ creates a collection of named objects, their types, and their relat ionships to each other in an entity to be managed. Answer: SMI We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________. Answer: SMI We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________. Answer: MIB We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is h andled by _______. Answer: SMNP SMI emphasizes three attributes to handle an object: _____, ________, and _____ ____. Answer: name; data type; encoding method To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure Answer: tree All objects managed by SNMP are given an object identifier. The object identifie r always starts with _______. Answer:1.3.6.1.2.1 To define the data type, SMI uses fundamental _______ definitions and adds some new definitions. Answer:ASN.1 SMI has two broad categories of data type: _______ and _______. Answer: simple; structured The _______ data types are atomic data types. Answer: simple SMI defines two structured data types: ________ and _________. Answer: sequence; a sequence o SMI uses another standard, ___________, to encode data to be transmitted over th e network. Answer: BER The _________ ordering enables a manager to access a set of variables one after another by defining the first variable. Answer: lexicographic The GetRequest PDU is sent from the _______ to the __________ to retrieve the va lue of a variable or a set of variables. Answer: client; server

The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest. Answer: server; client The Trap PDU is sent from the ______ to the _______ to report an event. Answer: server; client SNMP uses the services of UDP on two well-known ports, _______ and _______. Answer: 161; 162 _______ runs the SNMP client program; _______ runs the SNMP server program. Answer: manager; an agent INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI. Answer:ASN.1 Which of the following could be a legitimate MIB object identifier? Answer: 1.3.6.1.2.1.1 Which is a manager duty? Answer: Retrieve the value of an object defined in an agent. / Store the value of an object defined in an agent. For a 1-byte length field, what is the maximum value for the data length? Answer: 127 An object id defines a _______. Add a zero suffix to define the _______. Answer:variable; variable contents An SNMP agent can send _______ messages. Answer: Trap An SNMP agent can send _______ messages. Answer: Response The _______ field in the SNMP PDU is an offset that points to the variable in er ror. Answer:error index The _______ field in the SNMP PDU reports an error in a response message. Answer: error status The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values. Answer: VarBindList _________ is a repository of information linked together from points all over th e world. A) The WWW The WWW today is a _______ client-server service, in which a client using a br owser can access a service using a server. Answer:distributed The _________ is a standard for specifying any kind of information on the Inter net. Answer:URL In a URL, the _______ is the client-server program used to retrieve the documen t. Answer: protocol In a URL, the ______ is the computer on which the information is located. Answer: host In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon. Answer: none of the above In a URL, the _______ is the full name of the file where the information is loc ated. Answer: path A cookie is made by the ________ and eaten by the _________. Answer: server; server The documents in the WWW can be grouped into ______ broad categories. Answer: three A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. Answer: static

_____________ is a language for creating Web pages. Answer:HTML A _______ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic ___________ is a technology that creates and handles dynamic documents. Answer: CGI Dynamic documents are sometimes referred to as _________ dynamic documents. Answer: server-site For many applications, we need a program or a script to be run at the client si te. These are called _______________ documents. Answer: active One way to create an active document is to use __________. Answer: Java applets. Active documents are sometimes referred to as _________ dynamic documents. Answer: client-site HTTP uses the services of _________ on well-known port 80. Answer: TCP In HTTP, the first line in a request message is called a _______ line; the firs t line in the response message is called the ________ line. Answer: none of the above In a ___________ connection, one TCP connection is made for each request/respon se. Answer: nonpersistent In a ___________connection, the server leaves the connection open for more requ ests after sending a response. Answer: persistent HTTP version 1.1 specifies a _________connection by default. Answer:persistent In HTTP, a _______ server is a computer that keeps copies of responses to recen t requests. Answer: proxy An HTTP request message always contains _______. Answer: a request line and a header Which of the following is present in both an HTTP request line and a status lin e? Answer: HTTP version number The HTTP request line contains a _______ method to request a document from the s erver. Answer: GET A user needs to send the server some information. The request line method is __ _____. Answer: POST The HTTP request line contains a _______ method to get information about a docu ment without retrieving the document itself. Answer: HEAD A response message always contains _______. Answer:a status line and a header An applet is _______ document application program. Answer: an active TestKing is using private IP addressing in their network. Which of the following IP addresses is a private IP address? (Select all that apply) answer: C: 172.20.14.36 E:192.168.42.34 TestKing is migrating to a private IP addressing scheme. Which of the following describe the use of private IP addresses? (Choose two) answer: B. Addresses that cannot be routed through the public Internet.///D. A s cheme to conserve public addresses. TestKing is using IP addressing according to RFC 1918. Which three address range

s are used for internal private address blocks as defined by RFC 1918? (Choose a ll that apply) answer: B: 10.0.0.0 to 10.255.255.255///D. 172.16.0.0 to 172.31.255.255///F. 192 .168.0.0 to 192.168.255.255 TestKing needs to ensure their IP network can be reached from the Internet. Whic h of the following host addresses are members of networks that can be routed acr oss the public Internet? (Choose three.) answer: C. 172.64.12.29///E. 198.234.12.95///F. 212.193.48.254 From where does a small network typically get its IP network addresses or IP blo ck? answer:C. From the Internet Service Provider (ISP) Router TestKing2 has been configured with these commands: hostname TestKing2 i nterface FastEthernet 0/0 ip address 198.133.219.14 255.255.255.248 no shu tdown interface FastEthernet 0/1 ip address 192.168.10.254 255.255.255.0 no shutdown interface Serial 0/0 ip address 64.100.0.2 255.255.255.252 no sh utdown ip route 0.0.0.0 0.0.0.0 64.100.0.1 What are the two results of this c onfiguration? (Choose two) answer: C. Hosts on the LAN that is connected to FastEthernet 0/1 will not be ab le to access the Internet without address translation.////E. The addressing sche me allows users on the Internet to access the TestKingA server. You are the newly appointed CiscoSystem trainee. Your supervisor tells you that the IP address for your workstation is 172.16.209.10/22. He wants to know what t he subnetwork number of your workstation is. What will your reply be? answer: C. 172.16.208.0 You are a network technician at CiscoSystem. CiscoSystem has a larger 172.12.0.0 network that you want to divide into subnets. You want each subnet to support 4 59 hosts. You also want to provide the maximum number of subnets. Which network mask should you use? answer:D. 255.255.254.0. CiscoSystem is acquiring a new Class C IP network. Which of the following subnet masks will provide one useful subnet for each department while still making all owance for enough usable host addresses per department as specified in the graph ic? answer: C. 255.255.255.224 You are a network administrator at CiscoSystem. You must configure a new subnetw ork at the CiscoSystem branch office in Berlin. You have been provided with the subnet mask of 255.255.255.224. You want to assign IP addresses to hosts on the subnet. Which of the following IP addresses would you use? (Choose three.) answer: C. 92.11.178.93////D. 134.178.18.56 ///E. 192.168.16.87 You are a network technician at CiscoSystem, Inc. You are installing a new works tation to the CiscoSystem network. The relevant network segment is shown in the following exhibit: What should be the IP address of the host? answer: C. 192.168.5.40 Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.) answer: the geographic scope of the network///the physical layer implementation/ //the number of hosts to be interconnected Refer to the exhibit. Assuming that the network in the exhibit is converged mean ing the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for www.ser

ver? answer: 00-0c-85-cf-65-c0 Which options are properties of contention-based media access for a shared media ? (Choose three.) answer: non-deterministic///less overhead///collisions exist What is true concerning physical and logical topologies? answer: Logical topologies consist of virtual connections between nodes. What determines the method of media access control? (Choose two.) answer: media sharing///logical topology What is true regarding media access control? (Choose three.) answer: Ethernet utilizes CSMA/CD///defined as placement of data frames on the m edia///Data Link layer protocols define the rules for access to different media Which statements describe the logical token-passing topology? (Choose two.) answer: Computers are allowed to transmit data only when they possess a token.// /Electronic tokens are passed sequentially to each other. A network administrator has been asked to provide a graphic representation of ex actly where the company network wiring and equipment are located in the building . What is this type of drawing? answer: physical topology What is the purpose of the preamble in an Ethernet frame? answer: is used for timing synchronization What statements are true regarding addresses found at each layer of the OSI mode l? (Choose two.) answer: Layer 2 may identify devices by a physical address burned into the netwo rk card///Layer 3 represents a hierarchical addressing scheme Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit? answer: Network 1 uses CSMA/CD and Network 3 uses CSMA/CA. Refer to the exhibit. How many CRC calculations will take place as traffic route s from the PC to the laptop? answer: 8 Refer to the exhibit. A frame is being sent from the PC to the laptop. Which sou rce MAC and IP addresses will be included in the frame as it leaves RouterB? (Ch oose two.) answer: source MAC Fa0/1 on RouterB///source IP PC Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? answer: MAC What two facts are true when a device is moved from one network or subnet to ano ther? (Choose two.) answer: The device will still operate at the same Layer 2 address.///The Layer 3 address must be reassigned to allow communications to the new network. What is a function of the data link layer? answer: provides for the exchange data over a common local media What is a characteristic of a logical point-to-point topology?

answer: The media access control protocol can be very simple. What is a primary purpose of encapsulating packets into frames? answer: facilitate the entry and exit of data on media What is the primary purpose of the trailer in a data link layer frame? answer: support frame error detection What are three characteristics of valid Ethernet Layer 2 addresses? (Choose thre e.) answer: They are 48 binary bits in length.///They are considered physical addres ses.///They are generally represented in hexadecimal format. When connectionless protocols are implemented at the lower layers of the OSI mod el, what is usually used to acknowledge that the data was received and to reques t the retransmission of missing data? answer: an upper-layer, connection-oriented protocol or service Refer to the exhibit. Each media link is labeled. What type of cable should be u sed to connect the different devices? answer: Connection 1 straight-through cable Connection 2 crossover cable Con nection 3 straight-through cable Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? answer: transport Refer to the exhibit. What is the correct destination socket number for a web pa ge request from Host A to the web server? answer: 198.133.219.25:80 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? answer: Use the ping 127.0.0.1 command at the command prompt. Which type of media is immune to EMI and RFI? (Choose two.) answer: 100 Base-FX///1000 Base LX Refer to the exhibit. The command that is shown was issued on a PC. What does th e IP address 192.168.33.2 represent? answer: primary domain name server for the host Refer to the exhibit. The diagram represents the process of sending email betwee n clients. Select the list below that correctly identifies the component or prot ocol used at each numbered stage of the diagram. answer: 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA What is true regarding network layer addressing? (Choose three) answer: heirarchical///uniquely identifies each host///contains a network portio n Which OSI layers offers reliable, connection-oriented data communication service s? answer: transport Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replac ement computer can not access the company network. What is the likely cause of t he problem?

answer: subnet mask incorrectly entered Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320 .D632 and the destination MAC address 0030.8517.44C4. The packet inside the capt ured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? answer: leaving Dallas Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.) answer: The destination port indicates that an HTTP session has been initiated./ //The data listed is associated with the transport layer. Refer to the exhibit. On the basis of the IP configuration that is shown, what i s the reason that Host A and Host B are unable to communicate outside the local network? answer: The gateway address was assigned a broadcast address. Which of the following are the address ranges of the private IP addresses? (Choo se three.) answer: 10.0.0.0 to 10.255.255.255///172.16.0.0 to 172.31.255.255///192.168.0.0 to 192.168.255.255 Which combination of network id and subnet mask correctly identifies all IP addr esses from 172.16.128.0 through 172.16.159.255? answer: 172.16.128.0 255.255.224.0 Which password is automatically encrypted when it is created? answer: enable secret Which three statements characterize the transport layer protocols? (Choose three .) answer: TCP and UDP port numbers are used by application layer protocols.///TCP uses windowing and sequencing to provide reliable transfer of data.///TCP is a c onnection-oriented protocol. UDP is a connectionless protocol. When must a router serial interface be configured with the clock rate command? answer: when the interface is functioning as a DCE device Which two functions of the OSI model occur at layer two? (Choose two.) answer: physical addressing///media access control A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error? answer: router Refer to the exhibit. With the router running NAT, what IP addresses can be appl ied to the computer to allow access to the Internet? (Choose three) answer: 192.168.18.49///192.168.18.52///192.168.18.59 Due to a security violation, the router passwords must be changed. What informat ion can be learned from the following configuration entries? (Choose two) answer: The entries specify four Telnet lines for remote access.///Access will b e permitted for Telnet using c13c0? as the password. As network administrator, what is the subnet mask that allows 510 hosts given th e IP address 172.30.0.0? answer: 255.255.254.0

Which statements correctly identify the role of intermediary devices in the netw ork? (Choose three.) answer: determine pathways for data///retime and retransmit data signals///manag e data flows Select the statements that are correct concerning network protocols. (Choose thr ee.) answer: define the structure of layer specific PDU s///outline the functions neces sary for communications between layers///require layer dependent encapsulations What are two functions of encapsulation? (Choose two.) answer: identifies pieces of data as part of the same communication///ensures th at data pieces can be directed to the correct receiving end device What is a primary function of the trailer information added by the data link lay er encapsulation? answer: supports error detection Which two layers of the OSI model have the same functions as the TCP/IP model Ne twork Access Layer? (Choose two.) answer: Physical///Data Link What is a PDU? answer: a layer specific encapsulation Which characteristic correctly refers to end devices in a network? answer: originate data flow Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which devic e type best describes the function of wireless device Cell A? answer: an end device Refer to the exhibit. Which three labels correctly identify the network types fo r the network segments that are shown? (Choose three.) answer: Network B WAN///Network C LAN///Network A LAN Which three statements best describe a Local Area Network (LAN)? (Choose three.) answer: A LAN is usually in a single geographical area.///The network is adminis tered by a single organization.///A LAN provides network services and access to applications for users within a common organization. Refer to the exhibit. Which networking term describes the data interleaving proc ess represented in the graphic? answer: multiplexing What is the primary purpose of Layer 4 port assignment? answer: to identify the processes or services that are communicating within the end devices What device is considered an intermediary device? answer: switch Refer to the exhibit. Which term correctly identifies the device type that is in cluded in the area B? answer: intermediary Refer to the exhibit. What type of network is shown? answer: LAN

Which layer encapsulates the segment into packets? answer: network What can be identified by examining the network layer header? answer: the destination host address Refer to the exhibit. Which set of devices contains only end devices? answer: E, F, H, I, J During the encapsulation process, what occurs at the data link layer? answer: The physical address is added. What is the purpose of the TCP/IP Network Access layer? answer: network media control What is the proper order of the layers of the OSI model from the highest layer t o the lowest layer? answer: application, presentation, session, transport, network, data link, physi cal What application layer protocol is commonly used to support for file transfers b etween a client and a server? answer: FTP What are two forms of application layer software? (Choose two.) answer: applications///services A network administrator is designing a network for a new branch office of twenty -five users. What are the advantages of using a client-server model? (Choose two .) answer: centralized administration.///security is easier to enforce What is the purpose of resource records in DNS? answer: sed by the server to resolve names What is the automated service that matches resource names with the required IP a ddress? answer: DNS What three protocols operate at the Application layer of the OSI model? (Choose three.) answer: DNS///SMTP///POP What are three properties of peer-to-peer applications? (Choose three.) answer: acts as both a client and server within the same communication///hybrid mode includes a centralized directory of files///can be used in client-server ne tworks Which application layer protocols correctly match a corresponding function? (Cho ose two.) answer: HTTP transfers data from a web server to a client///Telnet provides a vi rtual connection for remote access Which email components are used to forward mail between servers? (Choose two.) answer: MTA///SMTP As compared to SSH, what is the primary disadvantage of telnet? answer: does not support encryption Which statements are correct concerning the role of the MTA in handling email? (

Choose three.) answer: receives email from the client s MUA///# passes email to the MDA for final delivery # uses SMTP to route email between servers Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) answer: HTTP///HTTPS A small home network has been for gaming and file sharing. Choose two.) answer: Security is difficult haring request is functioning installed to interconnect three computers together What two properties represent this network type? ( to enforce.///A computer that responds to a file s as a server.

Which layer of the OSI model supplies services that allow user to interface with the network? answer: application Refer to the exhibit. What is the destination port for the communication that is represented on line 5? answer: 80 What are two characteristics of peer-to-peer networks? (Choose two.) answer: decentralized resources///resource sharing without a dedicated server What application layer protocol describes the services that are used for file sh aring in Microsoft networks? answer: SMB What are two characteristics of clients in data networks? (Choose two.) answer: initiate data exchanges///may upload data to servers What is the role of the OSI application layer? answer: provides the interface between the applications on either end of the net work How does the application layer on a server usually process multiple client reque st for services? answer: uses support from lower layer functions to distinguish between connectio ns to the service In an IPv4 environment, what information is used by the router to forward data p ackets from one interface of a router to another? answer: destination network address What information is added during encapsulation at OSI Layer 3? answer: source and destination IP address In a connectionless system, which of the following is correct? answer: The destination is not contacted before a packet is sent. Which IP packet field will prevent endless loops? answer: time-to-live Which portion of the network layer address does a router use to forward packets? answer: network portion Refer to the exhibit. Using the network in the exhibit, what would be the defaul t gateway address for host A in the 192.133.219.0 network? answer: 192.133.219.1

If the default gateway is configured incorrectly on the host, what is the impact on communications? answer: The host can communicate with other hosts on the local network, but is u nable to communicate with hosts on remote networks. What is the purpose of a default gateway? answer: identifies the device that allows local network computers to communicate with devices on other networks What type of routing uses information that is manually entered into the routing table? answer: static When the destination network is not listed in the routing table of a Cisco route r, what are two possible actions that the router might take? (Choose two.) answer: The router discards the packet.///The router forwards the packet out the interface indicated by the default route entry. What are the key factors to consider when grouping hosts into a common network? (Choose three.) answer: purpose///geographic location///ownership What is a component of a routing table entry? answer: the next-hop address Which intermediary devices could be used to implement security between networks? (Choose two.) answer: router///firewall What are three common problems with a large network? (Choose three.) answer: performance degradation///security issues///host identification Refer to the exhibit. All devices shown in the exhibit have factory default sett ings. How many broadcast domains are represented in the topology that is shown? answer: 4 Which three statements are true about routes and their use? (Choose three.) answer: If the destination network is directly connected, the router forwards th e packet to the destination host.///If no route exists for the destination netwo rk and a default route is present, the packet is forwarded to the next-hop route r.///If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route. Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packe ts out the network. Using the netstat -r command, the administrator would identi fy which address as the address to which all hosts send packets that are destine d for an outside network? answer: 10.10.10.6 Refer to the exhibit. A network administrator notices that there are too many br oadcasts on the network. What two steps can the network administrator take to re solve this problem? (Choose two.) answer: Replace S2 with a router.///Subnet the 192.168.0.0 /24 network. Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choos e two.) answer: 192.168.0.2 is the next-hop address that is used by R3 to route a packet

from the 10.0.0.0 network to the 172.16.0.0 network.//////192.168.0.1 is the ne xt-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network. What two characteristics are commonly associated with dynamic routing protocols? (Choose two.) answer: provide routers with up-to-date routing tables///consume bandwidth to ex change route information What statement describes the purpose of a default route? answer: A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists. Which OSI layer is responsible for binary transmission, cable specification, and physical aspects of network communication? answer: Physical An installed fiber run can be checked for faults, integrity, and the performance of the media by using what device? answer: OTDR Which characteristics describe fiber optic cable? (Choose two.) answer: It is not affected by EMI or RFI.///It is the most expensive type of LAN cabling. When is a straight-through cable used in a network? answer: when connecting a host to a switch Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B? answer: crossover cable Which method of signal transmission uses radio waves to carry signals? answer: wireless In most business LANs, which connector is used with twisted-pair networking cabl e? answer: RJ-45 Which of the following is a characteristic of single-mode fiber-optic cable? answer: generally uses lasers as the light source Which type of cable run is most often associated with fiber-optic cable? answer: backbone cable What are three measures of data transfer? (Choose three.) answer: goodput///throughput///bandwidth With the use of unshielded twisted-pair copper wire in a network, what causes cr osstalk within the cable pairs? answer: the magnetic field around the adjacent pairs of wire What is a primary role of the Physical layer in transmitting data on the network ? answer: create the signals that represent the bits in each frame on to the media In LAN installations where potential electrical hazards or electromagnetic inter ference may be present, what type of media is recommended for backbone cabling? answer: fiber

What is a possible effect of improperly applying a connector to a network cable? answer: Data transmitted through that cable may experience signal loss. What is considered a benefit of wireless as a media choice? answer: more host mobility What characteristic of UTP cable helps reduce the effects of interference? answer: the twisting of the wires in the cable Convert the binary number 10111010 into its hexadecimal equivalent. Select the c orrect answer from the list below. answer: BA Which of the following describe interframe spacing? (Choose two.) answer: the minimum interval, measured in bit-times, that any station must wait before sending another frame///the time allowed for slow stations to process a f rame and prepare for the next frame When a collision occurs in a network using CSMA/CD, how do hosts with data to tr ansmit respond after the backoff period has expired? answer: The hosts return to a listen-before-transmit mode. After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data? answer: any device in the collision domain whose backoff timer expires first Which of the following is a drawback of the CSMA/CD access method? answer: Collisions can decrease network performance. Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link? answer: No collisions will occur on this link. Why do hosts on an Ethernet segment that experience a collision use a random del ay before attempting to transmit a frame? answer: A random delay helps prevent the stations from experiencing another coll ision during the transmission. In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet fra me to Host D when Host B wishes to transmit its own frame to Host C. What must H ost B do? answer: Host B must wait until it is certain that Host A has completed sending i ts frame. Ethernet operates at which layers of the OSI model? (Choose two.) answer: Physical layer///Data-link layer What does the IEEE 802.2 standard represent in Ethernet technologies? answer: Logical Link Control sublayer Which statements correctly describe MAC addresses? (Choose three.) answer: copied into RAM during system startup///# contains a 3 byte OUI # 6 byte s long Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.) answer: A frame with the destination MAC address of Router_A./// A packet with t he destination IP of Server_B.

Host A has an IP address of 172.16.225.93, a mask of 255.255.248.0, and a defaul t gateway of 172.16.224.1. Host A needs to send a packet to a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on its address and subnet mask. What two things will occur? (Choose two.) answer: Host A will get a result of 172.16.224.0 from the AND process.///Host A will broadcast an ARP request for the MAC of the host 172.16.231.78. Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.) answer: minimizing of collisions///increase in the throughput of communications Ethernet operates at which layer of the TCP/IP network model? answer: network access What are three functions of the upper data link sublayer in the OSI model? (Choo se three.) answer: identifies the network layer protocol///makes the connection with the up per layers///insulates network layer protocols from changes in physical equipmen t What three primary functions does data link layer encapsulation provide? (Choose three.) answer: # addressing # error detection # frame delimiting What are the two most commonly used media types in Ethernet networks today? (Cho ose two.) answer: copper UTP///optical fiber Refer to the exhibit. Which option correctly identifies content that the frame d ata field may contain? answer: network layer packet What is the primary purpose of ARP? answer:resolve IPv4 addresses to MAC addresses Immediately after a router completes its boot sequence, the network administrato r wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.) answer: show startup-config///show running-config Users in the network are experiencing slow response time when doing file transfe rs to a remote server. What command could be issued to determine if the router h as experienced any input or output errors? answer: show interfaces The connection between routers B and C has been successfully tested. However, af ter rebooting router C, the administrator noticed the response time between netw orks 10.10.3.0 and 10.10.4.0 is slower. Ping between the two routers is successf ul. A trace route indicates three hops from router B to router C. What else can be done to troubleshoot the problem? answer: Issue a show ip interface brief command on router C. What command is used to change the default router name to Fontana? answer: Router(config)# hostname Fontana The serial connection shown in the graphic needs to be configured. Which configu ration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) answer: # Sydney(config-if)# ip address 201.100.53.2 255.255.255.0 # Sydney(conf

ig-if)# no shutdown///Sydney(config-if)# clock rate 56000 Refer to the exhibit. The output is shown for the show ip route command executed on Router A. What does the IP address 192.168.2.2 represent? answer: IP assigned to the serial port on Router B Refer to the exhibit. What additional command is required to allow remote access to this switch from hosts outside the local network? answer: NA-SW1(config)# ip default-gateway address In a Cisco device, where is the IOS file stored prior to system startup? answer: Flash When network services fail, which port is most often used to access a router for management purposes? answer: Console A network administrator needs to keep the user ID, password, and session content s private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen? answer: SSH In a Cisco router, when do changes made to the running-configuration take effect ? answer: as the commands are entered Refer to the exhibit. Which names correctly identify the CLI mode represented by the prompt for Switch-East4#? (Choose two.) answer: privileged executive mode///enable mode Which three terms correctly define the forms of help available within the Cisco IOS? (Choose three.) answer: hot keys///context-sensitive///command syntax check Which combination of keys would be used at the CLI prompt to interrupt a ping or traceroute process? answer: Ctrl-Shift-6 Refer to the exhibit. What command will place the router into the correct mode t o configure an appropriate interface to connect to a LAN? answer: UBAMA(config)# interface FastEthernet 0/1 On a Cisco router, which interface would be used to make the initial configurati on? answer: Console Refer to the exhibit. A student is responsible for the IP addressing, configurat ion and connectivity testing of the network shown in the graphic. A ping from ho st B to host C results in a destination unreachable but a ping from host B to ho st A was successful. What two reasons could account for this failure based on th e graphic and partial router output for the Dallas router? (Choose two.) answer: The S0/0/1 IP address of Dallas is improperly configured.///The clock ra te is missing on the serial link between Dallas and NYC. Based on the transport layer header shown in the diagram, which of the following statements describe the established session? answer: This contains a Telnet request///This is a TCP header. With TCP/IP data encapsulation, which range of port numbers identifies all wellknown applications?

answer: 0 to 1023 Why are port numbers included in the TCP header of a segment? answer: to enable a receiving host to forward the data to the appropriate applic ation Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? answer: transport Refer to the exhibit. Host A is using FTP to download a large file from Server 1 . During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? answer: reach a timeout and resend the data that needs to be acknowledged Why is flow control used for TCP data transfer? answer: to prevent the receiver from being overwhelmed by incoming data Which two options represent Layer 4 addressing? answer: identifies the communicating applications///identifies multiple conversa tions between the hosts Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed? answer: session establishment Refer to the exhibit. What two pieces of information can be determined from the output that is shown? answer: The local host is using three client sessions///The local host is using web sessions to a remote server. What is dynamically selected by the source host when forwarding data? answer: source port What are two features of the User Datagram Protocol (UDP)? answer: low overhead///connectionless What mechanism is used by TCP to provide flow control as segments travel from so urce to destination? answer: window size Which transport layer protocol provides low overhead and would be used for appli cations which do not require reliable data delivery? answer: UDP Which information is found in both the TCP and UDP header information? answer: source and destination port Which three features allow TCP to reliably and accurately track the transmission of data from source to destination? answer: flow control///session establishment///numbering and sequencing During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message? answer: The packets will be delivered and reassembled at the destination. Which is an important characteristic of UDP? answer: minimal delays in data delivery

After a web browser makes a request to a web server that is listening to the sta ndard port, what will be the source port number in the TCP header of the respons e from the server? answer: 80 Which event occurs during the transport layer three-way handshake? answer: TCP initializes the sequence numbers for the sessions. Refer to the exhibit. Host1 is in the process of setting up a TCP session with H ost2. Host1 has sent a SYN message to begin session establishment. What happens next? answer: Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1. Refer to the exhibit. Which network prefix will implement the IP addressing sche me for the LANs shown in the graphic? answer: /27 Which IPv4 subnetted addresses represent valid host addresses? answer: 172.16.4.155 /26///172.16.4.193 /26///172.16.4.207 /27 Which statements are true regarding IP addressing? answer: Private addresses are blocked from public Internet by router.///IP addre ss 127.0.0.1 can be used for a host to direct traffic to itself. Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask? answer: binary ANDing Refer to the exhibit. Host A is connected to the LAN, but it cannot get access t o any resources on the Internet. The configuration of the host is shown in the e xhibit. What could be the cause of the problem? answer: The default gateway is on a different subnet from the host. What subnet mask would a network administrator assign to a network address of 17 2.30.1.0 if it were possible to have up to 254 hosts? answer: 255.255.255.0 Which three IP addresses are private? answer: 10.35.66.70///192.168.99.5///172.18.88.90 Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address? answer: This is a network address. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong? answer: 172.16.192.160 Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has dec ided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable hos t address. Which configuration should be entered into the workgroup server s prope rties to allow connectivity to the network? answer: IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33 Which of the following network devices are recommended to be assigned static IP

addresses? answer: servers///network printers///routers Which of the following are features of IPv6? answer: larger address space///data types and classes of service///authenticatio n and encryption What is the primary reason for development of IPv6? answer: expanded addressing capabilities What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? answer: The router will discard the packet.///The router will send a time exceed ed message to the source host. Refer to the exhibit. Why would the response shown be displayed after issuing th e command ping 127.0.0.1 on a PC? answer: Internet Protocol is not properly installed on the host. How many bits make up an IPv4 address? answer: 32 Refer to the exhibit. A network administrator discovers that host A is having tr ouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible ca use of this problem? answer: NAT is required for the host A network. What three facts are true about the network portion of an IPv4 address? answer: is identical for all hosts in a broadcast domain///is identical for all hosts in a broadcast domain///is used to forward packets What is a group of hosts called that have identical bit patterns in the high ord er bits of their addresses? answer: a network What is the network address of the host 172.25.67.99 /23 in binary? answer: 10101100. 00011001.01000010.00000000 Refer to the exhibit. A network administrator has to develop an IP addressing sc heme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network wil l be allocated the same number of host addresses. Which network mask will be app ropriate to address the remaining networks? answer: 255.255.255.192 Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? answer: connecting two routers together via their fast ethernet ports///connecti ng two devices with the same interface type at Fast Ethernet speeds Which option identifies the primary interface which would be used for initial co nfiguration of a Cisco router? answer: console interface What makes fiber preferable to copper cabling for interconnecting buildings? answer: greater distances per cable run///limited susceptibility to EMI/RFI///gr eater bandwidth potential A network administrator is required to use media in the network that can run up

to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing bui lding with limited cabling space. Which type of media would best meet these requ irements? answer: UTP What does the term attenuation mean in data communication? answer: loss of signal strength as distance increases How many host addresses may be assigned on each subnetwork when using the 130.68 .0.0 network address with a subnet mask of 255.255.248.0? answer: 2046 Which subnet mask would be assigned to the network address of 192.168.32.0 to pr ovide 254 useable host addresses per subnetwork? answer: 255.255.255.0 A company is planning to subnet its network for a maximum of 27 hosts. Which sub net mask would provide the needed hosts and leave the fewest unused addresses in each subnet? answer: 255.255.255.224 What type of network cable is used between a terminal and a console port? answer: rollover Which device is used to create or divide broadcast domains? answer: router Refer to the exhibit. What destination IP address will PC1 place in the header f or a packet destined for PC2? answer: 192.168.3.54 Refer to the exhibit. Based on the IP configuration shown, what would be the res ult of Host A and Host B attempting to communicate outside the network segment? answer: host B would be successful, host A would fail Which three types of connectors are commonly associated with Cisco s V.35 serial c ables? answer: DB 60///Winchester 15 pin///smart serial Refer to the exhibit. How many subnets are required to support the network that is shown? answer: 3 What are two common methods for setting a UTP Ethernet port to MDI or MDIX opera tion? answer: the automatic detection and negotiating of MDI/MDIX operation of the por t///the enabling of the mechanism to electrically swap the transmit and receive pairs Refer to the exhibit. A student is setting up a home network primarily used for extensive file transfers, streaming video, and gaming. Which network device is b est suited to these types of activities in the topology shown? answer: switch Which three statements are true about the role of routers in the network? answer: They segment broadcast domains.///They interconnect different network te chnologies.///Each router interface requires a separate network or subnet. Refer to the exhibit. A network administrator has decided to use packet capture

software to evaluate all traffic from the student subnet on the way to the Inter net. To ensure that all packets are captured, what network device should be used to connect the monitoring station to the network between R1 and R2? answer: hub Refer to the exhibit. Assume that all devices are using default settings. How ma ny subnets are required to address the topology that is shown? answer: 1 Refer to the exhibit. Which three statements are true about the exhibited topolo gy? answer: Five broadcast domains are present.///Host B is using a crossover cable to connect to the router.///Five networks are shown. To establish a console connection from a computer to a Cisco router, which cable wiring option would be used? answer: rollover cable Refer to the exhibit. Which three statements identify the type of cabling that w ould be used in the segments that are shown? answer: Segment 1 uses a patch cable.///Segment 3 uses horizontal cabling.///Seg ment 4 uses vertical cabling. Refer to the exhibit. A network technician has been allocated the 192.168.1.0/24 private IP address range for use in the network that shown in the exhibit. Whic h subnet mask would be used to meet the host requirements for segment A of this internetwork? answer: 255.255.255.224 What is the framing method used in PPP? answer: Byte stuffing Assume the RTT 200ms, the transmission time of a Web object 10ms, how long does it take to download that object from a Web Server to a client if using non-persi stent HTTP? answer: 410ms Why was the OSI model developed? answer: Standards were needed to allow any two systems to communicate The physical layer is concerned with the movement of _______ over a physical med ium. answer: bits Which OSI model functions as a link between user support layers and network supp ort layers? answer: Transport Routers function within which layer(s)? answer: All of the above An IP header size = ? answer: 20 - 60 bytes long A multicast message is sent from _____ to _____? answer: One source; multiple destinations Connection establishment in TCP is referred to as? answer: Two-way handshaking

which layer exists between the Presentation and Transport layers? answer: Session In networking, what does ATM stand for? answer: Asynchronous Transfer Mode Which type of encoding was named after a city in England? answer: Manchester Which is USUALLY larger: WAN, LAN or MAN? answer: WAN What San Jose based company is currently considered to be the king of networks? answer: Cisco What does the 802 in the various network standards stand for? answer: February 1980 Which of the following is not a network topology? answer: Serial What is the correct way to end an HTML page? answer: </HTML> The maximum number of nodes per segment depends on the_______.? answer: Attenuation Information can be transmitted via one of_______siganlling method(s). answer: Two IEEE designates Thicknet as_______Ethernet. answer: 10Base5 Vertical connectors between floors are known as_______. answer: Riser ________ensure(s) that data are transferred whole, in sequence, and without erro r from one node on the network to another. answer: Protocol - correct answer The maximum segment lenght on a 10BaseT network is_______meters. answer: 100 The first networks transmitted data over thick, heavy coaxial cables. answer: True Which cannot support full-duplexing? answer: 100BaseT4 Which is not an exmple of transmission media? answer: None of the above Mail services requires a significant commitment of technical support and adminis tration and resources due to their_______. answer: Heavy use WAN requires the same technology as LAN. answer: False Mail services can only run one kind of system.

answer: False On modern networks, the transceiver are separate from the NICs. answer: False You can mix 100BaseTX and 1000BaseT4 on a single network segment answer: False How many layers in the OSI model? answer: 7 Which device act as a traffic cop? answer: Router Collision occurs when two devices on the same network segment attempt to simulta neously transmit. answer: True Fiber Optic cable conducts electricity. answer: False What is SMTP? answer: Simple mail transport protocol An organization that share devices, saves______. answer: All of the above Peer-to-Peer network are not flexible. answer: False Windows 98 does not qualify as a netowrk-operating system. answer: True The computer you are controlling or working via a network. answer: remote computer You should always try to pull all networks services on a single server. answer: False HTTP is the protocol use to view web pages. answer: True A network of computers and other devices that is confined to a relatively small space. answer: Peer-to-Peer network What layer of OSI does the encryption/decryption? answer: Presentaion layer E-mail use communication protocol. answer: SMTP What is the default port number for SMTP? answer: 25 What is the default port number for FTP? answer: 21 What is the default port number for Web server such as IIS and Apache? answer: 80

Which layer of the OSI model supports file transfer and network management? answer: 7 ______ is a network management protocol sponsored by the ISO that was once a com petitor to SNMP. answer: CMIP Which of the following commands provide information on virtual memory, disk acce ss, and CPU use? answer: vmstat ______ routers communicate with other routers to calculate routes automatically using routing protocols such as RIP and OSPF. answer: Dynamic Authority for the internet rests with the ______. answer: ISOC ______ is a programming language used by SNMP to create actual MIB objects. answer: ASN.1 The number represented by 10111001 is an odd number. answer: True In Windows NT, which program would you use to provide information on your system performance? answer: Performance Monitor The subnet mask identifies whether the destination address is local or remote th rough ______. answer: ANDing The ______ file holds info on the root name servers needed to initialize the cac he of internal domain name servers. answer: named.ca The command for viewing an arp cache in Linux is ______. answer: arp The Linux ______ command is used to assign an internet address to a network inte rface. answer: ifconfig Which of the following are network management protocols? answer: SGMP Which of the following OSI layers is concerned with the transmission of unstruct ured bit stream over a physical link? answer: 1 What is the default subnet mask for a class C address? answer: 255.255.255.0 Arp resolves network layer addresses to data link layer addresses. answer: True ______ information indicates whether the system has restarted, been reconfigured and then restarted, or is out of service. answer: Polling

To track physical disk activity, which of the following commands would you use? answer: diskperf -y Determine the class of the following IP address: 10011010 01000111 0010010 11100 101 answer: B FTP uses port 21 for sending ________ and port 20 for sending ________. answer: eIdentification and password Data file In the exponential backoff phase of CSMA/CD, after n collisions of a frame, the adapter then waits K x 512 bit times before sensing the channel again, where K i s chosen at a random from answer: {0,1,2, ,2m-1}where m=min(n,10) In the PPP frame, the ______ field defines the contents of the data field answer: FCS Main reason of packet loss in the Internet is ________. answer: Routers drop packets because their buffers are full The Link State (LS) algorithm results in answer: The least cost path from one node to all nodes in the networks What are the two methods of circuit switching for dividing bandwidth? answer: FDM and TDM In the DNS, the names are defined in ________ structure answer: A tree What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? answer: DHCP A name server is _____ for a host if it always has a DNS record that translates the host s hostname to that host s IP address answer: Authoritative In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link Two-dimensional parity check can ________. answer: Detect a single bit error and correct it Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switching Why CSMA/CD is not used in WiFi? answer: Because of the hidden terminal problem and fading problem, it is difficu lt to detect collision of signals When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 101 Those followings a) Slow start b) Congestion avoidance c)Fast retransmit d)Fa st recovery, are mechanisms of ___________ answer: TCP congestion control

Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet answer: 129.17.129.96 129.17.129.127 Which delay mainly depends on the congestion of the network? answer: Congesting delay What is the throughput of a link in a network? answer: Number of bits travelling through the link in a unit time Traceroute command uses answer: ICMP Which one is correct about P2P network? answer: A user computer can be both client and server Generic router architecture includes answer: All of them The core of the Internet consist of answer: Routers Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ ____ to transfer email between the client and the server answer: HTTP There are 4 serial links between the client and the server, with the transmissio n rates being 1Mbps, 3Mbps, 2Mbps, and 0.5Mbps. What is the throughput between t he client and the server? answer: 0.5 Mbps Which of the following is the MAC protocol? answer: CSMA/CD In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet, after the fir st collision of a frame, the adapter then waits before sensing the channel again . answer: 512 microseconds IMAP is designed to allow users to manipulate ____, so it is more ______ than PO P3 answer: Remote mailboxes complex CSMA/CA belong _____ group, one of three broad classes of MAC protocols answer: Random access What is incorrect about Web cache (proxy server)? answer: Web caches can improve in internet performance in general The transport layer protocol provides logical communication between ___ running on different hosts, while the network layer protocol provides logical communicat ion between ______. answer: Processes Hosts In TCP congestion control, two important variables the sender has to keep track are answer: Congestion window and socket number In IP fragmentation, a datagram is fragmented into two packets, then the first p

acket has answer: Offset=0 and FragFlag=1 rdt3.0 provides reliable data transfer over a ____________. answer: Lossy channel with bit errors The time-to-live (TTL) field in the datagram is included to insure that answer: Do not circulate forever in the network A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identification field is the same for all three datagrams Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead. answer: 20 8 In OSI model, as data packet moves from the lower to the upper layer header are _______. answer: Removed Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic Which statement is correct about router? answer: Each interface to have an unique IP address Which of the following is hybrid of client-server and P2P? answer: Skype Channel partitioning, random access, and taking turns are _______. answer: MAC protocols The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF The DNS protocol runs over ______ and uses port ______. answer: UDP 53 In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 What is the total delay for transmission of 1.25 megabytes of images over fiber optic cable with distance of 3000km with transmission rate if 1Gbps (ignore all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 20msec Which one is not in UDP segment header? answer: Receiving Window Size The __________ that together implement the DNS distributed database, store _____ ____for the hostname to IP address mappings. answer: Authoritative servers Entries What is NOT a function of a router? answer: Working with IP address What is cut-through operation is swithches?

answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived The purpose of ICMP echo request and ICMP echo reply messages is to _________. answer: Report errors This job of delivering the data in a ______ to the correct _______ is called demultiplexing answer: Transport-layer segment application process The combination of an IP address and a port number is called a _____. answer: Socket Which layer in the Internet that connects directly to wire? answer: Transport layer Which layer in the Internet that connects directly to wire? answer: Physical _______ is a supplementary protocol that allows non-ASCII data to be sent throug h email. answer: MIME ________applications typically uses_________. answer: Loss-tolerant UDP In TCP, what can happen if the timeout is smaller than the connection s round-trip time? answer: It can result in unnecessary retransmissions Which of the following is the pipelining protocol answer: Selective Repeat Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? answer: 201.14.78.64 1. Refer to the exhibit. A network administrator needs to add IP phones to the n etwork. To which devices should the IP phones connect? AS1 and AS2/ DS1 and DS2/ DS1, DS2, and CS1/ AS1, AS2, DS1, and DS2 Answer: AS1 and AS2 2. Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting? Answer: privileged EXEC mode 3. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose t wo.) Answer: 802.11a suffers from a shorter range than 802.11g. / 802.11g is backward compatible with 802.11b, but 802.11a is not. 4. Which two statements concerning network security are accurate? (Choose two.) Answer: Open authentication uses no client or AP verification. / 802.11i incorpo rates a RADIUS server for enterprise authentication. 5. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both tr ansmit data at the same time. How do the hosts respond on the network? (Choose t wo.) Answer: After the end of the jam signal, a backoff algorithm is invoked. / If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting. 6. Refer to the exhibit. An administrator documented the output of a CAM table f rom an Ethernet switch as shown. What action will the switch take when it receiv es the frame shown at the bottom of the exhibit?

Answer: forward the frame out all ports except port 3 7. What two methods can be used to remove MAC address table entries from a switc h? (Choose two.) Answer: Power cycle the switch to clear all dynamically learned addresses. / The clear mac-address-table command will remove statically and dynamically configur ed table entries. 8. Which three statements are correct concerning the default configuration of a new switch? (Choose three.) Answer: It is configured in VTP server mode. / STP is automatically enabled. / A ll switch ports are assigned to VLAN1. 9. What will be the effect of the command S1# copy system:running-config tftp:// 172.16.2.155/tokyo-config? Answer: The running configuration file on S1 will be saved via TFTP to a file na med tokyo-config. 10. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown? Answer: The switch learned this MAC address from the source address in a frame r eceived on Fa0/18. 11. Company policy requires disabling the command history buffer on network devi ces. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command hist ory buffer is still available. What is the problem? Answer: The size parameter reset the default buffer size but did not disable acc ess to the buffer. 12. Refer to the exhibit. The devices in the network are operational and configu red as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem? Answer: Hosts B and D are configured with IP addresses from different subnets. 13. A network administrator is implementing VTP in a large campus LAN that conta ins one hundred switches. What are valid considerations for reliability and admi nistration? Answer: Configuring several switches in server mode will allow all VLANs to be e ntered from a single switch and preserve VLAN data if any of the switches or con nections are lost. 14. Refer to the exhibit. Switch SW-A is to be used as a temporary replacement f or another switch in the VTP Student domain. What two pieces of information are indicated from the exhibited output? (Choose two.) Answer: There is a risk that the switch may cause incorrect VLAN information to be sent through the domain. / This switch will update its VLAN configuration whe n VLAN changes are made on a VTP server in the same domain. 15. What is the purpose of issuing the command switchport mode access on a switc h interface? Answer: force the port to be a part of a single vlan 16. Refer to the exhibit. What happens when a frame from a source MAC address di fferent from 00a8.d2e4.ba27 reaches switch port 0/5? Answer: The frame is dropped. 17. Refer to the exhibit. What will be the result of the commands that are shown in the exhibit? Answer: DHCP server responses will only be permitted on interface Fa0/2. 18. Why is it important that the network administrator consider the spanning-tre e network diameter when choosing the root bridge? Answer: BPDUs may be discarded because of expiring timers. 19. What is the purpose of the Spanning Tree algorithm? Answer: It prevents loops in a switched network with redundant paths. 20. Refer to the exhibit. What is the result of issuing these commands? Answer: The password will be set for the first Telnet connection. 21. Refer to the exhibit. Each switch is shown with its MAC address. Which switc h will be elected as the spanning-tree root bridge if the switches are configure d with their default priority values? Answer: The port will transition immediately into forwarding state.

22. Which statement is correct about STP architecture? Answer: Spanning Tree Protocol will guarantee a loop free Layer 2 topology. 23. Refer to the exhibit. All switches are configured with the default bridge pr iority. Which port will act as a non-designated port if all links are operating at the same bandwidth? Answer: Fa0/1 interface of switch A 24. Refer to the exhibit. Which Spanning Tree Protocol version is in effect? Answer: Rapid Spanning Tree Protocol (RSTP) 25. Refer to the exhibit. Each switch is configured to participate in STP for VL ANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20? Answer: S1 port Fa0/11 is in the wrong VLAN. 26. Which installation method will allow connectivity for a new wireless network ? Answer: set up open access on both the access point and each device connected to it 27. Refer to the exhibit. When configuring the wireless access point, which sett ing does the network administrator use to configure the unique identifier that c lient devices use to distinguish this wireless network from others? Answer: Network Name (SSID) 28. Which two statements are true regarding wireless security? (Choose two.) Answer: Default SSIDs on specific manufacturer APs are generally known and.. / . Manually adding a network and setting the known SSID on a wireless client makes 29. Wireless users on a network complain about poor performance within a small a rea of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem? Answer: This might be RF channel overlap, so the technician should verify the ch annels in use on each wireless access point and change to non-overlapping channe ls. 30. Which three devices do many wireless routers incorporate? (Choose three.) Answer: gateway for connecting to other network infrastructures / built-in Ether net switch / wireless access point 31. Which access method does a wireless access point use to allow for multiple u ser connectivity and distributed access? Answer: CSMA/CA 32. Why is security so important in wireless networks? Answer: Wireless networks broadcast data over a medium that allows easy access. 33. Which wireless technology standard provides the most compatibility with olde r wireless standards, but has greater performance? Answer: 802.11n 34. Which two statements characterize wireless network security? (Choose two.) Answer: A rogue access point represents a security risk for the local network./ With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect 35. . Which two statements characterize wireless network security? (Choose two.) Answer: A rogue access point represents a security risk for the local network / With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect. 36. Which network design process identifies where to place access points? Answer: site survey 37. What wireless security feature allows a network administrator to configure a n access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network? Answer: MAC address filtering 38. What will a wireless client transmit to discover the available WLAN networks ? Answer: probe request 39. . In a WLAN network, why should wireless access points be implemented with e ach access point using a different channel? Answer: to keep signals from interfering with each other 40. What purpose does authentication serve in a WLAN?

Answer: determines that the correct host is utilizing the network 41. What occurs when a rogue access point is added to a WLAN? Answer: Unauthorized users can gain access to internal servers, thus causing a s ecurity hole 42. What procedure can prevent man-in-the-middle attacks? Answer: Force all devices on a WLAN to authenticate and monitor for any unknown devices. 43. Which function is provided by a wireless access point? Answer: converts data from 802.11 to 802.3 frame encapsulation 44. Which major problem does CSMA/CA overcome in wireless networks? Answer: media contention 45. What does a wireless access point use to allow WLAN clients to learn which n etworks are available in a given area? Answer: beacon 46. When a collision occurs in a network using CSMA/CD, how do hosts with data t o transmit respond after the backoff period has expired? Answer: The hosts return to a listen-before-transmit mode 47. efer to the exhibit. The switch and workstation are administratively configu red for full-duplex operation. Which statement accurately reflects the operation of this link? Answer: No collisions will occur on this link. 48. Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C if the MAC address table of SW1 is empty? Answer: SW1 floods the frame on all ports on SW1, except port Fa0/1. 49. When a switch receives a frame and the source MAC address is not found in th e switching table, what action will be taken by the switch to process the incomi ng frame? Answer: The switch will map the source MAC address to the port on which it was r eceived. 50. Refer to the exhibit. The switch and the hub have default configurations, an d the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C? Answer: workstation C 51. Refer to the exhibit. How many collision domains are depicted in the network ? Answer: 2 52. Which two statements about Layer 2 Ethernet switches are true? (Choose two.) Answer: Layer 2 switches have multiple collision domains. / Layer 2 switches can send traffic based on the destination MAC address. 53. Which command line interface (CLI) mode allows users to configure switch par ameters, such as the hostname and password? Answer: global configuration mode 54. A network administrator uses the CLI to enter a command that requires severa l parameters. The switch responds with % Incomplete command . The administrator can not remember the missing parameters. What can the administrator do to get the pa rameter information? Answer: append a space and then ? to the last parameter 55. Where is the startup configuration stored? Answer: NVRAM 56. If a network administrator enters these commands on a switch, what will be t he result? Switch1(config-line)# line console 0 / Switch1(config-line)# password cisco / Switch1(config-line)# login Answer: to secure the console port with the password cisco 57. Refer to the exhibit. The network administrator has decided to allow only Se cure Shell connections to Switch1. After the commands are applied, the administr ator is able to connect to Switch1 using both Secure Shell and Telnet. What is m ost likely the problem? Answer: missing transport input ssh command 58. Which two statements are true about EXEC mode passwords? (Choose two.) Answer: The enable secret password command provides better security than the ena

ble password. / The enable password and enable secret password protect access to privileged EXEC mode 59. Refer to the exhibit. The exhibit shows partial output of the show running-c onfig command. The enable password on this switch is cisco. What can be determined from the output shown? Answer: Any configured line mode passwords will be encrypted in this configurati on 60. Which statement is true about the command banner login Authorized personnel O nly issued on a switch? Answer: The command will cause the message Authorized personnel Only to display before a user logs in. 61. What are two ways to make a switch less vulnerable to attacks like MAC addre ss flooding, CDP attacks, and Telnet attacks? (Choose two.) Answer: Change passwords regularly. / Turn off unnecessary services. 62. Which two statements are true regarding switch port security? (Choose two.) Answer: Dynamically learned secure MAC addresses are lost when the switch reboot s. / If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum nu mber is reached. 63. Refer to the exhibit. What happens when Host 1 attempts to send data? Answer: Frames from Host 1 cause the interface to shut down. 64. What happens when the transport input ssh command is entered on the switch v ty lines? Answer: Communication between the switch and remote users is encrypted 65. Refer to the exhibit. Which hosts will receive a broadcast frame sent from H ost A? Answer: hosts B, C, D, and E 66. Which statement is true when VTP is configured on a switched network that in corporates VLANs? Answer: VTP dynamically communicates VLAN changes to all switches in the same V TP domain. 67. What are two features of VTP client mode operation? (Choose two.) Answer: unable to add VLANs / can forward VLAN information to other switches in the same VTP domain 68. Refer to the exhibit. Switch S1 is in VTP server mode. Switches S2 and S3 ar e in client mode. An administrator accidentally disconnects the cable from F0/1 on S2. What will the effect be on S2? Answer: S2 will retain the VLANs as of the latest known revision. 69. Refer to the exhibit. All switches in the VTP domain are new. Switch SW1 is configured as a VTP server, switches SW2 and SW4 are configured as VTP clients, and switch SW3 is configured in VTP transparent mode. Which switch or switches r eceive VTP updates and synchronize their VLAN configuration based on those updat es? Answer: SW3 and SW4 receive updates, but only switch SW4 synchronizes VLAN infor mation 70. Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other switche s. What is the reason for this? Answer: VLANs created on transparent mode switches are not included in VTP adver tisements. 71. Refer to the exhibit. S2 was previously used in a lab environment and has be en added to the production network in server mode. The lab and production networ ks use the same VTP domain name, so the network administrator made no configurat ion changes to S2 before adding it to the production network. The lab domain has a higher revision number. After S2 was added to the production network, many co mputers lost network connectivity. What will solve the problem? Answer: Re-enter all appropriate VLANs, except VLAN 1, manually on Switch1 so th at they propagate throughout the network. 72. What does a client mode switch in a VTP management domain do when it receive

s a summary advertisement with a revision number higher than its current revisio n number? Answer: It issues an advertisement request for new VLAN information. 73. What causes a VTP configured switch to issue a summary advertisement? Answer: A five-minute update timer has elapsed. 74. Which two statements are true about VTP pruning? (Choose two.) Answer: Pruning can only be configured on VTP servers / Pruning will prevent unn ecessary flooding of broadcasts across trunks. 75. Which three VTP parameters must be identical on all switches to participate in the same VTP domain? (Choose three.) Answer: domain name / domain password / version number 76. Refer to the exhibit. All switches in the network participate in the same VT P domain. What happens when the new switch SW2 with a default configuration and revision number of 0 is inserted in the existing VTP domain Lab_Network? Answer: The switch operates as a VTP server, but does not impact the existing VL AN configuration in the domain. 77. Refer to the exhibit. Switches SW1 and SW2 are interconnected via a trunk li nk but failed to exchange VLAN information. The network administrator issued the show vtp status command to troubleshoot the problem. On the basis of the provid ed command output, what could be done to correct the problem? Answer: The switches must be configured with the same VTP domain name 78. Refer to the exhibit. Switch1 is not participating in the VTP management pro cess with the other switches that are shown in the exhibit. What are two possibl e explanations for this? (Choose two.) Answer: Switch1 is in a different management domain. / Switch1 is using VTP vers ion 1, and Switch2 is using VTP version 2. 79. Refer to the exhibit. Which two facts can be confirmed by this output? (Choo se two.) Answer: If this switch is added to an established network, the other VTP-enabled switches in the same VTP domain will consider their own VLAN information to be more recent than the VLAN information advertised by this switch. / This switch i s configured to advertise its VLAN configuration to other VTP-enabled switches i n the same VTP domain. 80. Refer to the exhibit. What information can be learned from the output provid ed? Answer: It verifies VTP advertisements are being exchanged 81. Which two statements describe VTP transparent mode operation? (Choose two.) Answer: Transparent mode switches can add VLANs of local significance only. / Tr ansparent mode switches pass any VLAN management information that they receive t o other switches. 82. Which two statements are true about the implementation of VTP? (Choose two.) Answer: Switches must be connected via trunks / The VTP domain name is case sen sitive 83. A network administrator is replacing a failed switch with a switch that was previously on the network. What precautionary step should the administrator take on the replacement switch to avoid incorrect VLAN information from propagating through the network? Answer: Change the VTP domain name 84. What statement describes the default propagation of VLANs on a trunked link? Answer: VLANs 1 to 1005 85. How are VTP messages sent between switches in a domain? Answer: Layer 2 multicast 86. Refer to the exhibit. All switches in the network have empty MAC tables. STP has been disabled on the switches in the network. How will a broadcast frame th at is sent by host PC1 be handled on the network? Answer: Switch SW1 will forward the broadcast out all switch ports, except the o riginating port. This will generate an endless loop in the network 87. Refer to the exhibit. Server sends an ARP request for the MAC address of its default gateway. If STP is not enabled, what will be the result of this ARP req uest?

Answer: Switch_A and Switch_B will continuously flood the message onto the netwo rk. 88. What two elements will exist in a converged network with one spanning tree? (Choose two.) Answer: one root bridge per network / one root port per non-root bridge 89. Which two criteria does a switch use to select the root bridge? (Choose two. ) Answer: bridge priority / base MAC address 90. In which two ways is the information that is contained in BPDUs used by swit ches? (Choose two.) Answer: to identify the shortest path to the root bridge / to determine which p orts will forward frames as part of the spanning tree 91. Which two statements describe the BIDs used in a spanning tree topology? (Ch oose two.) Answer: They consist of a bridge priority and MAC address. / They are used by th e switches in a spanning tree topology to elect the root bridge 92. Refer to the exhibit. The spanning-tree port priority of each interface is a t the default setting. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command? Answer: Gi0/2 on S3 transitions to a root port 93. In which STP state does a port record MAC addresses but not forward user dat a? Answer: learning 94. What two features of the Spanning-Tree Protocol contribute to the time it ta kes for a switched network to converge after a topology change occurs? (Choose t wo.) Answer: the max-age timer / the forward delay 95. Which two items are true regarding the spanning-tree portfast command? (Choo se two.) Answer: PortFast is Cisco proprietary / If an access port is configured with Por tFast, it immediately transitions from a blocking to a forwarding state 96. What is the first step in the process of convergence in a spanning tree topo logy? Answer: election of the root bridge 97. How can a network administrator influence which STP switch becomes the root bridge? Answer: Set the switch priority to a smaller value than that of the other switch es in the network. 98. Which statement or set of paired statements correctly compares STP with RSTP ? Answer: STP waits for the network to converge before placing ports into forwardi ng state. RSTP places designated ports into forwarding state immediately. 99. When PVST+ was developed, the Bridge ID was modified to include which inform ation? Answer: VLAN ID 100. Which two actions does an RSTP edge port take if it receives a BPDU? (Choos e two.) Answer: immediately loses its edge status / becomes a normal spanning-tree port 101. What three link types have been defined for Rapid Spanning-Tree Protocol? ( Choose three.) Answer: shared / edge-type / point-to-point 102. Which three statements are accurate regarding RSTP and STP? (Choose three.) Answer: Both RSTP and STP use the portfast command to allow ports to immediately transition to forwarding state. / # Configuration commands to establish primary and secondary root bridges are identical for STP and RSTP. / Because of the for mat of the BPDU packet, RSTP is backward compatible with STP. 103. Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two.) Answer: Decisions on which port to block when two ports have equal cost depend o

n the port priority and identity. / Non-root switches each have only one root po rt 104. Refer to the exhibit. What can be determined from the output shown? Answer: The priority was statically configured to identify the root. 105. What Rapid Spanning Tree Protocol (RSTP) role is assigned to the forwarding port elected for every Ethernet LAN segment that links two switches? Answer: designated 106. Refer to the exhibit. Which three statements describe the network design sh own in the exhibit? (Choose three.) Answer: This design will not scale easily / This design uses more switch and rou ter ports than are necessary / # If the physical interfaces between the switch a nd router are operational, the devices on the different VLANs can communicate th rough the router.. 107. A router has two FastEthernet interfaces and needs to connect to four VLANs in the local network. How can this be accomplished using the fewest number of p hysical interfaces without unnecessarily decreasing network performance? Answer: Implement a router-on-a-stick configuration. 108. Refer to the exhibit. All devices are configured as shown in the exhibit. P C2 can successfully ping the F0/0 interface on R1. PC2 cannot ping PC1. What mig ht be the reason for this failure? Answer: S1 interface F0/8 is in the wrong VLAN 109. Refer to the exhibit. The commands for a router to connect to a trunked upl ink are shown in the exhibit. A packet is received from IP address 192.168.1.54. The packet destination address is 192.168.1.120. What will the router do with t his packet? Answer: The router will forward the packet out interface FastEthernet 0/1.2 tagg ed for VLAN 60. 110. What distinguishes traditional routing from router-on-a-stick? Answer: Traditional routing uses one port per logical network. Router-on-a-stick uses subinterfaces to connect multiple logical networks to a single router port . 111. Which statement is true about ARP when inter-VLAN routing is being used on the network? Answer: When router-on-a-stick inter-VLAN routing is in use, the router returns the MAC address of the physical interface in response to ARP requests. 112. What two statements are true regarding the use of subinterfaces for inter-V LAN routing? (Choose two.) Answer: fewer router ports required than in traditional inter-VLAN routing / les s complex physical connection than in traditional inter-VLAN routing 113. Which three elements must be used when configuring a router interface for V LAN trunking? Answer: one subinterface per VLAN / one IP network or subnetwork for each subint erface / a compatible trunking protocol encapsulation for each subinterface 114. Refer to the exhibit. Which two statements are true about the operation of the subinterfaces? (Choose two.) Answer: Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa 0/0.2. / # Traffic inbound on this router is processed by different subinterface s, depending on the VLAN from which the traffic originated. 115. Refer to the exhibit. Port Fa0/0 on router R1 is connected to port Fa0/1 on switch S1. After the commands shown are entered on both devices, the network ad ministrator determines that the devices on VLAN 2 are unable to ping the devices on VLAN 1. What is the likely problem? Answer: R1 is configured for router-on-a-stick, but S1 is not configured for tru nking 116. Refer to the exhibit. PC1 has attempted to ping PC2 but has been unsuccessf ul. What could account for this failure? Answer: The encapsulation command on the R1 F0/0.3 interface is incorrect 117. Refer to the exhibit. R1 is routing between networks 192.168.10.0/28 and 19 2.168.30.0/28. PC1 can ping R1 interface F0/1, but cannot ping PC3. What is caus ing this failure?

Answer: The PC3 network address configuration is incorrect 118. Devices on the network are connected to a 24-port Layer 2 switch that is co nfigured with VLANs. Switch ports 0/2 to 0/4 are assigned to VLAN 10. Ports 0/5 to 0/8 are assigned to VLAN 20, and ports 0/9 to 0/12 are assigned to VLAN 30. A ll other ports are assigned to the default VLAN. Which solution allows all VLANs to communicate between each other while minimizing the number of ports necessar y to connect the VLANs? Answer: Add a router to the topology and configure one FastEthernet interface on the router with multiple subinterfaces for VLANs 1, 10, 20, and 30. 119. Which two statements are true about the interface fa0/0.10 command? (Choose two.) Answer: The command is used in the configuration of router-on-a-stick inter-VLAN routing. / # The command configures a subinterface. 120. Refer to the exhibit. What two conclusions can be drawn from the output tha t is shown? (Choose two.) Answer: Both of the directly connected routes that are shown will share the same physical interface of the router. / Inter-VLAN routing between hosts on the 172 .17.10.0/24 and 172.17.30.0/24 networks is successful on this network 121. What are the steps which must be completed in order to enable inter-VLAN ro uting using router-on-a-stick? Answer: Create the VLANs on the switch to include port membership assignment and configure subinterfaces on the router matching the VLANs. 122. Refer to the exhibit. The network administrator correctly configures RTA to perform inter-VLAN routing. The administrator connects RTA to port 0/4 on SW2, but inter-VLAN routing does not work. What could be the possible cause of the pr oblem with the SW2 configuration? Answer: Port 0/4 is configured in access mode. 123. What is important to consider while configuring the subinterfaces of a rout er when implementing inter-VLAN routing? Answer: The IP address of each subinterface must be the default gateway address for each VLAN subnet. 124. In which situation could individual router physical interfaces be used for InterVLAN routing, instead of a router-on-a-stick configuration? Answer: a network with a limited number of VLANs 125. Refer to the exhibit. Switch1 is correctly configured for the VLANs that ar e displayed in the graphic. The configuration that is shown was applied to RTA t o allow for interVLAN connectivity between hosts attached to Switch1. After test ing the network, the administrator logged the following report: Hosts within eac h VLAN can communicate with each other. / Hosts in VLAN5 and VLAN33 are able to communicate with each other. / Hosts connected to Fa0/1 through Fa0/5 do not hav e connectivity to host in other VLANs. Answer: The router was not configured to forward traffic for VLAN2. 126. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect? Answer: AS1 and AS2 127. Which CLI mode allows users to access all device commands, such as those us ed for configuration, management, and troubleshooting? Answer: privileged EXEC mode 128. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.) Answer:After the end of the jam signal, a backoff algorithm is invoked. / If a h ost has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting. 129. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it rece ives the frame shown at the bottom of the exhibit? Answer: forward the frame out all ports except port 3 130. What two methods can be used to remove MAC address table entries from a swi tch? (Choose two.)

Answer: Power cycle the switch to clear all dynamically learned addresses. / The clear mac-address-table command will remove statically and dynamically configur ed table entries. 131. Which three statements are correct concerning the default configuration of a new switch? (Choose three.) Answer: It is configured in VTP server mode. / STP is automatically enabled. / A ll switch ports are assigned to VLAN1. 132.What will be the effect of the command S1# copy system:running-config tftp:/ /172.16.2.155/tokyo-config? Answer: The running configuration file on S1 will be saved via TFTP to a file na med tokyo-config. 133. Which two statements describe the benefits of VLANs? (Choose two.) Answer: VLANs improve network security by isolating users that have access to se nsitive data and applications. / VLANs divide a network into smaller logical net works, resulting in lower susceptibility to broadcast storms. 134. What are two characteristics of VLAN1 in a default switch configuration? (C hoose two.) Answer: VLAN 1 is the management VLAN. / All switch ports are members of VLAN1 135. Refer to the exhibit. SW1 and SW2 are new switches being installed in the t opology shown in the exhibit. Interface Fa0/1 on switch SW1 has been configured with trunk mode on . Which statement is true about forming a trunk link between the switches SW1 and SW2? Answer: Interface Fa0/2 on switch SW2 will negotiate to become a trunk link if i t supports DTP. 136. Refer to the exhibit. Computer 1 sends a frame to computer 4. On which link s along the path between computer 1 and computer 4 will a VLAN ID tag be include d with the frame? Answer: C, E 137. The network administrator wants to separate hosts in Building A into two VL ANs numbered 20 and 30. Which two statements are true concerning VLAN configurat ion? (Choose two.) Answer: The VLANs may be named / The network administrator may create the VLANs in either global configuration mode or VLAN database mode. 138. Refer to the exhibit. Which two conclusions can be drawn regarding the swit ch that produced the output shown? (Choose two.) Answer: The command switchport access vlan 20 was entered in interface configura tion mode for Fast Ethernet interface 0/1. / Devices attached to ports fa0/5 thr ough fa0/8 cannot communicate with devices attached to ports fa0/9 through fa0/1 2 without the use of a Layer 3 device. 139. What happens to the member ports of a VLAN when the VLAN is deleted? Answer: The ports cannot communicate with other ports. 140. A network administrator is removing several VLANs from a switch. When the a dministrator enters the no vlan 1 command, an error is received. Why did this co mmand generate an error? Answer: VLAN 1 can never be deleted 141. What is the effect of the switchport mode dynamic desirable command? Answer: A trunk link is formed if the remote connected device is configured with the switchport mode dynamic auto or switchport mode trunk commands. 142. Refer to the exhibit. The exhibited configurations do not allow the switche s to form a trunk. What is the most likely cause of this problem? Answer: Enter the switchport mode access command in interface configuration mode . 143. Refer to the exhibit. Computer B is unable to communicate with computer D. What is the most likely cause of this problem? Answer: Computer D does not have a proper address for the VLAN 3 address space. 144. Refer to the exhibit. The network administrator has just added VLAN 50 to S witch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10. 1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem? Answer: VLAN 50 is not allowed to entering the trunk between Switch1 and Switch2

. 145. Refer to the exhibit. Which statement is true concerning interface Fa0/5? Answer: Trunking can occur with non-Cisco switches. 146. What statements describe how hosts on VLANs communicate? Answer: Hosts on different VLANs communicate through routers. 147. Refer to the exhibit. How far is a broadcast frame that is sent by computer A propagated in the LAN domain? Answer:computer D, computer G 148. What is a valid consideration for planning VLAN traffic across multiple swi tches? Answer: # A trunk connection is affected by broadcast storms on any particular V LAN that is carried by that trunk. 149. What statement about the 802.1q trunking protocol is true? Answer: 802.1q will not perform operations on frames that are forwarded out acce ss ports. 150. What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in dynamic desirable mode? Answer: on, auto, or dynamic desirable mode 151. Refer to the exhibit. Company HR is adding PC4, a specialized application w orkstation, to a new company office. The company will add a switch, S3, connecte d via a trunk link to S2, another switch. For security reasons the new PC will r eside in the HR VLAN, VLAN 10. The new office will use the 172.17.11.0/24 subnet . After installation, users on PC1 are unable to access shares on PC4. What is t he likely cause? Answer: PC4 must use the same subnet as PC1. 152. What must the network administrator do to remove Fast Ethernet port fa0/1 f rom VLAN 2 and assign it to VLAN 3? Answer: Enter the switchport access vlan 3 command in interface configuration mo de 153. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.) Answer: 802.11a suffers from a shorter range than 802.11g. / 802.11g is backward compatible with 802.11b, but 802.11a is not. 154. Which two statements concerning network security are accurate? (Choose two. ) Answer: Open authentication uses no client or AP verification. / 802.11i incorpo rates a RADIUS server for enterprise authentication. 155. Which installation method will allow connectivity for a new wireless networ k? Answer: set up open access on both the access point and each device connected to it 156. Refer to the exhibit. When configuring the wireless access point, which set ting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others? Answer: Network Name (SSID) 157. Which two statements are true regarding wireless security? (Choose two.) Answer: Default SSIDs on specific manufacturer APs are generally known and may p ermit hostile wireless connections. / Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is no t being broadcast. 158. . Wireless users on a network complain about poor performance within a smal l area of a room. Moving away from this area in any direction improves performan ce dramatically. What is the first step in designing a solution to this problem? Answer: This might be RF channel overlap, so the technician should verify the ch annels in use on each wireless access point and change to non-overlapping channe ls. 159. Which three devices do many wireless routers incorporate? (Choose three.) Answer: gateway for connecting to other network infrastructures / built-in Ether net switch / wireless access point 160. Which access method does a wireless access point use to allow for multiple

user connectivity and distributed access? Answer: CSMA/CA 161. Why is security so important in wireless networks? Answer: Wireless networks broadcast data over a medium that allows easy access 162. Which wireless technology standard provides the most compatibility with old er wireless standards, but has greater performance? Answer: 802.11n 163. Which two statements characterize wireless network security? (Choose two.) Answer: A rogue access point represents a security risk for the local network / With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect. 164. Which network design process identifies where to place access points? Answer: site survey 165. What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network? Answer: MAC address filtering 166. What will a wireless client transmit to discover the available WLAN network s? Answer: probe request 167. In a WLAN network, why should wireless access points be implemented with ea ch access point using a different channel? Answer: to keep signals from interfering with each other 168. What purpose does authentication serve in a WLAN? Answer: determines that the correct host is utilizing the network 169. What occurs when a rogue access point is added to a WLAN? Answer: Unauthorized users can gain access to internal servers, thus causing a s ecurity hole. 170. What procedure can prevent man-in-the-middle attacks? Answer: Force all devices on a WLAN to authenticate and monitor for any unknown devices 171. Which function is provided by a wireless access point? Answer: converts data from 802.11 to 802.3 frame encapsulation 172. Which major problem does CSMA/CA overcome in wireless networks? Answer: media contention 173. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area? Answer: beacon R1 knows two routes, Path A and Path B, to the Ethernet network attached to R3. R1 learned Path A to network 10.2.0.0/16 from a static route and Path B to netwo rk 10.2.0.0/16 from EIGRP. Which route will R1 install in its routing table? Answer: The route via Path A is installed because the static route has the lowes t administrative distance to network 10.2.0.0/16. The network has three connected routers: R1, R2, and R3. The routes of all three routers are displayed. All routers are operational and pings are not blocked on this network. Which ping will fail? Answer: from R1 to 192.168.3.1 03. What are two functions of a router? (Choose two.) Answer: It connects multiple IP networks. It determines the best path to send p ackets. 04. Which two statements are true regarding link-state routing protocols? (Choos e two.) Answer: They are aware of the complete network topology.They offer rapid converg ence times in large networks. 05. Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose two.) Answer: It assigns a value that represents an infinite metric to the poisoned ro ute.It limits the number of hops a packet can traverse through the network befor e it is discarded.

Which router is advertising subnet 172.16.1.32/28? Answer: Router4 All router interfaces are configured with an IP address and are operational. If no routing protocols or static routes are configured, what information will be i ncluded in the show ip route command output for router A? Answer: Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 wi ll be in the routing table. 08. When a router boots, what is the default order to locate the Cisco IOS if th ere is no boot system command? Answer: flash, TFTP server, ROM 09. Which router component is used to store the routing table? Answer: SDRAM 10. Which three statements describe the operation of routing with EIGRP? (Choose three.) Answer: As new neighbors are discovered, entries are placed in a neighbor table. /If hello packets are not received within the hold time, DUAL must recalculate t he topology./The reported distance is the distance to a destination as advertise d by a neighbor. 11. What two routing protocols use a hierarchal network topology? (Choose two.) Answer: IS-IS/OSPF All routers are running RIPv1. The two networks 10.1.1.0/29 and 10.1.1.16/29 are unable to access each other. What can be the cause of this problem? Answer: RIPv1 does not support discontiguous networks. 13. What command would the network administrator apply to a router that is runni ng OSPF to advertise the entire range of addresses included in 172.16.0.0/19 in area 0? Answer: R1(config-router)# network 172.16.0.0 0.0.31.255 area 0 Which statement is true concerning the routing configuration? Answer: Packets routed to the R2 Fast Ethernet interface require two routing tab le lookups. A network administrator has enabled RIP on routers B and C in the network diagra m. Which of the following commands will prevent RIP updates from being sent to R outer A? answer: # B(config)# router rip B(config-router)# passive-interface S0/0 What information can be determined from the highlighted output? answer: Automatic summarization is disabled. Given the topology shown in the exhibit, what three commands are needed to confi gure EIGRP on the Paris router? (Choose three.) answer: Paris(config)# router eigrp 100/Paris(config-router)# network 192.168.7. 0/Paris(config-router)# network 192.168.8.0 18. A network administrator needs to assign the very last usable IP address in t he 172.24.64.0/18 network range to the router interface that serves this LAN. Wh ich IP address should the administrator configure on the interface? answer: 172.24.127.254/18 Based on the output from the show running-config and debug ip rip commands, what are two of the routes that are added to the routing table of R1? (Choose two.) answer: # R 192.168.1.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/1 # R 192 .168.100.0/24 [120/1] via 172.16.1.1, 00:00:24, Serial0/0/0 The show cdp neighbors command was run at R1. Which two facts about the newly de tected device can be determined from the output? (Choose two.) answer: ABCD is a router that is connected to R1./The device is connected at the Serial0/0/1 interface of R1. 21. A network is configured with the IP, IPX, and AppleTalk protocols. Which rou ting protocol is recommended for this network? answer: EIGRP The network administrator is planning IP addressing of a new network. What part of this addressing scheme must be changed to allow communication between host A and the server? answer: the IP address of the server the IP address of the server

answer: The hello and dead intervals are different on the two routers. Both routers are using the RIP protocol. Devices on the 192.168.1.1 network can ping the S0/0/0 interface on R2 but cannot ping devices on the 192.168.2.1 netwo rk. What is a possible cause of this problem? answer: The routers are configured with different versions of RIP. 25. A router has EIGRP configured as the only routing protocol. In what way migh t EIGRP respond if there is no feasible successor route to a destination network and the successor route fails? answer: It sends queries to adjacent neighbors until a new successor route is fo und. 01. Which event will cause a triggered update? answer: a route is installed in the routing table 02. Three routers running a distance-vector routing protocol lost all power, inc luding the battery backups. When the routers reload, what will happen? answer: They will send updates that include only directly connected routes to th eir directly connected neighbors. 03. What does the RIP holddown timer do? answer: instructs routers to ignore updates, for a specified time or event, abou t possible inaccessible routes 04. Which two statements are true regarding the function of the RIPv1 routing up dates? (Choose two). answer: updates are broadcast at regular intervals / broadcasts are sent to 255. 255.255.255 05. Which of the following statements are correct about RIP? answer: will send out an update if there is a failure of a link 06. Which two statements describe EIGRP? (Choose two.) answer: EIGRP sends triggered updates whenever there is a change in topology tha t influences the routing information. / EIGRP sends a partial routing table upda te, which includes just routes that have been changed. 07. Which statement is true regarding cisco s RIP_JITTER variable? answer: It prevents the synchronization of routing updates by subtracting a rand om length of time ranging from 0% to 15% of the specified interval time from the next routing update interval. What actions will occur after RouterA loses connectivity to network 114.125.16.0 ? (Choose two.) answer: RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA. / Router C will learn of the loss of connectivity to network 114.125 .16.0 from RouterB. 09. Which of the following methods does split horizon use to reduce incorrect ro uting information? answer: Information learned from one source is not distributed back to that sour ce. The graphic shows a network that is configured to use RIP routing protocol. Rout er2 detects that the link to Router1 has gone down. It then advertises the netwo rk for this link with a hop count metric of 16. Which routing loop prevention me chanism is in effect? answer: route poisoning 11. What is the purpose of the TTL field in the IP header? answer: limits the time or hops that a packet can traverse through the network b efore it should be discarded 12. Which of the following can exist in a distance vector network that has not c onverged? (Choose three.) answer: routing loops/ routing loops / inconsistent routing table entries Refer to the exhibit. The routers in this network are running RIP. Router A has not received an update from Router B in over three minutes. How will Router A re spond? answer: The Invalid timer will mark the route as unusable if an update has not b een received in 180 seconds. 14. A network administrator is evaluating RIP versus EIGRP for a new network. Th e network will be sensitive to congestion and must respond quickly to topology c

hanges. What are two good reasons to choose EIGRP instead of RIP in this case? ( Choose two.) answer: EIGRP only updates affected neighbors. / EIGRP updates are partial. Refer to the exhibit. What path will packets from the 192.168.1.0/24 network tra vel to reach the 10.0.0.0/8 network if RIP is the active routing protocol? answer: The path will be router A -> router D -> router E. 16. Which three routing protocols are distance vector routing protocols? (Choose three). answer: RIPv1/ EIGRP/ RIPv2 17. What is a routing loop? answer: a condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destination 18. Which two conditions are most likely to cause a routing loop? (Choose two.) answer: inconsistent routing tables/ # incorrectly configured static routes 19. What metric does the RIP routing protocol consider to be infinity? answer: 16 Refer to the exhibit. If all routers are using RIP, how many rounds of updates w ill occur before all routers know all networks? answer: 3 Refer to the exhibit. All routers in the exhibit are running RIP v1. The network administrator issues the show ip route command on router A. What routes would a ppear in the routing table output if the network is converged? (Choose two). answer: R 192.168.2.0/24 [120/1] / R 10.10.1.0/24 [120/2] Refer to the exhibit. Router1 is running RIPv1. What command was entered into Ro uter1 to configure the gateway of last resort? answer: ip route 0.0.0.0 0.0.0.0 S0/0/1 Refer to the exhibit. Router1 and Router2 are running the RIPv1 protocol. The ne twork administrator configures the command network 10.1.0.0 on Router1. What net work will Router1 advertise to Router2? answer: 10.0.0.0/8 Which of the following would be the correct command sequence to enable RIP on Ro uter B for all connected networks? answer: # RouterB(config)# router rip RouterB(config-router)# network 198.16.4.0 RouterB(config-router)# network 210.36.7.0 RouterB(config-router)# network 220. 17.29.0 05. Which command will display RIP activity as it occurs on a router? answer: debug ip rip 06. Which command or set of commands will stop the RIP routing proces answer: RouterB(config)# no router rip Refer to the exhibit. RIPv1 is running on all three routers. All interfaces have been correctly configured with addresses in the address ranges that are shown. Which route would you see in the routing table on router CHI if the routers are configured with the commands that are displayed in the exhibit? answer: 192.168.0.0/24 What is the value of the routing metric? answer: 3 09. Which of the following is considered a limitation of RIP v1? answer: RIP v1 does not send subnet mask information in its updates. 10. What are three characteristics of the RIPv1 routing protocol? (Choose three. ) answer: uses hop count as a metric/ considers a metric of 16 as infinity/ calcul ates metrics using the Bellman Ford algorithm 11. What will happen if an interface IP address is entered for the address porti on of the network command in a RIPv1 configuration instead of a network address? answer: All interfaces in the same classful network as the configured address wi ll be included in the RIPv1 routing process. Refer to the exhibit. All routers that are shown are running the RIP routing pro tocol. All unknown IP traffic must be forwarded to the ISP. What router or set o f routers are recommended to have both a default route and the default-informati on originate command issued to implement this forwarding policy?

answer: only the gateway router Refer to the exhibit. All routers are configured with valid interface addresses in the indicated networks and are running RIPv1. The network is converged. Which routes are present in the routing tables? answer: All routers have all /30 routes. Routers A and E also have some of the / 24 routes in their routing table. Refer to the exhibit. A network consists of multiple routers. What can be verifi ed when the show ip protocols command is issued on one of the routers in the net work? answer: routing protocol configuration in use for IP on this router Refer to the exhibit. The Ethernet interface on Router2 goes down and the admini strator notices that the route is still valid in the routing table of Router1. H ow much longer will it take for Router1 to mark the route invalid by setting the metric to 16? answer: 155 seconds 16. What is the default update period in seconds for the RIP routing protocol? answer: 30 Refer to the exhibit. What can be concluded from the routing table output of rou ter B? answer: The default-information originate command has been entered on A. 18. Which two statements are true regarding the characteristics of RIPv1? (Choos e two). answer: It is a distance vector routing protocol./ The data portion of a RIP mes sage is encapsulated into a UDP segment. Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10 .0/24 network was recently added and will only contain end users. What command o r set of commands should be entered on Router1 to prevent RIPv1 updates from bei ng sent to the end user devices on the new network while still allowing this new network to be advertised to other routers? answer: Router1(config-router)# passive-interface fastethernet 0/0 01. What two advantages does CIDR provide to a network? (Choose two.) answer: reduced routing table size/ reduced routing update traffic Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wa sted addresses? answer: 255.255.255.252 Refer to the exhibit. A network engineer is summarizing the two groups of routes on router R1 shown in the exhibit. Which summarization will work for all the su bnets? answer: 192.168.0.0/21 04. Which of the following are contained in the routing updates of classless rou ting protocols? (Choose two.) answer: 32-bit address/ subnet mask 05. Which of the following problems does VLSM help to alleviate? answer: the shortage of IP addresses 06. What does VLSM allow a network administrator to do? answer: utilize multiple subnet masks in the same IP address space Refer to the exhibit. What subnet mask will be applied by router B when it recei ves a RIPv1 update for the network 172.16.1.0? answer: 24 Refer to the exhibit. The network administrator wants to minimize the number of entries in Router1 s routing table. What should the administrator implement on the network? answer: CIDR 09. A router has a summary route to network 192.168.32.0/20 installed in its rou ting table. What range of networks are summarized by this route? answer: 192.168.32.0 192.168.47.0/24 10. A network administrator is tasked with dividing up a class C network among t he QA, Sales, and Administration departments. The QA department is made up of 10

people, the Sales is made up of 28 people, and the Administration has 6. Which two subnets masks adequately address the QA and Sales departments? (Choose two.) answer: 255.255.255.224 for Sales/ 255.255.255.240 for QA In the network shown in the graphic, three bits were borrowed from the host port ion of a Class C address. How many valid host addresses will be unused on the th ree point-to-point links combined if VLSM is not used? answer: 84 A Class C address has been assigned for use in the network shown in the graphic. Using VLSM, which bit mask should be used to provide for the number of host add resses required on Router A, while wasting the fewest addresses? answer: /27 An additional subnet is required for a new Ethernet link between Router1 and Rou ter2 as shown in the diagram. Which of the following subnet addresses can be con figured in this network to provide a maximum of 14 useable addresses for this li nk while wasting the fewest addresses? answer: 192.1.1.224/28 14. Which three interior routing protocols support VLSM? (Choose three.) answer: OSPF/ RIP v2/ EIGRP Refer to the exhibit. The number of required host addresses for each subnet in a network is listed in the exhibit. This number includes the host address require ments for all router ports and hosts on that subnet. After all device and router port address assignments are determined, what will be the total number of unuse d host addresses available? answer: 29 Refer to the exhibit. In the network that is shown, the router interfaces are as signed the first address in each subnet. Which IP address would be usable for a host on one of the LANs in this network? answer: 192.168.2.130/25 Refer to the exhibit. Which address is a broadcast address for one of the subnet s that are shown in the exhibit? answer: 192.168.4.15/29 Refer to the exhibit. A network administrator needs to create two subnetworks fr om 10.0.0.0/8 for a router running RIPv2. The Admin subnet requires 120 hosts an d the Sales subnet requires 58 hosts. The network administrator assigned 10.0.1. 128/25 to the Admin subnet. The Sales subnet is given 10.0.1.192/26. What will b e the result of this addressing scheme? answer: The subnets overlap and will be rejected by the router. What is the likely cause of the failure of the ping from R1 to Host B? answer: The default gateway on Host B is not correctly set. 20. What is a supernet? answer: a summarization of serveral IP classful networks into one IP address ran ge Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network? answer: Rip version 2 will auto summarize routes by default. Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network? answer: Router2(config-router)# version 2 03. What are two reasons to implement RIP version 2 rather than RIP version 1? ( Choose two.) answer: RIP version 2 supports VLSM./ RIP version 2 supports routing update auth entication. 04. How are RIP v1 and RIP v2 similar to one another? (Choose three.) answer: They both use hop count as a metric./ They both have the same metric val ue for infinite distance./ They both use split horizon to prevent routing loops. Refer to the exhibit. Routers East and West are configured using RIPv1. Both rou ters are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?

answer: VLSM is not supported by RIPv1. Refer to the exhibit. Which command will allow Router2 to learn about the 192.16 8.16.0/28 network? answer: # Router1(config-router)# network 192.168.16.0 Refer to the exhibit. All routers are running RIP version 2. JAX is configured t o just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172 .16.0.0/16 network. A network administrator enters the commands shown in the exh ibit. What changes will occur in this network? answer: The CHI router will install a route to the 192.168.0.0/16 network in its routing table. Why does the router respond with an error?The network address for Loopback1 over laps with an already configured interface address. answer: The network address for Loopback1 overlaps with an already configured in terface address. 09. What is the maximum network diameter permitted by the default metric of RIPv 2? answer: 15 hops What are two functions of the network command used when configuring routing prot ocols? (Choose two.) answer: identifies which networks will be included in the routing updates/ deter mines which interfaces can send and receive routing updates Refer to the exhibit. What can be concluded from the output shown in the exhibit ? answer: The no auto-summary has not been configured on this router. 12. A network administrator has been told that the company IP address infrastruc ture must adhere to RFC 1918. What three IP address ranges from RFC 1918 could t he administrator use on the network? (Choose three.) answer: 10.0.0.0/8 / 172.16.0.0/12 / 192.168.0.0/16 Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1 .129/27 is configured on router B? answer: A connected route to the 10.16.1.128/27 network is added. 14. A network administrator installed four new routers that are running RIPv2. R outer1 is a boundary router in the RIPv2 network and has a default route configu red. Once the network has converged, the network administrator enters Router1(co nfig-router)# default-information originate on Router1. How will this affect the network? answer: propagates the default route to all routers in the network Refer to the exhibit. The exhibited network contains a mixture of Cisco and nonCisco routers. The command debug ip rip was entered on the JAX router. All route rs are running the same version of RIP. Router CHI and Router ORL are not able t o reach the 192.168.1.16/28 network. What is a possible solution to this problem ? answer: Configure RIPv2 on routers. 16. What field was added to the RIP message header by RFC 1723 to add support fo r VLSM and CIDR? answer: subnet mask Refer to the exhibit. What effect will the commands that are shown have on RIP u pdates for Router1? answer: Only version 2 updates are sent to 224.0.0.9. When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why? answer: RIPv1 is unable to route to discontiguous subnets of a major network. 19. RIPv2 is the configured routing protocol on the routers in a network. The co mmand Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates? answer: Version 1 and 2 updates will be received and the version 2 updates will not be sent. Refer to the exhibit. What can be determined from this output? answer: All of the routes listed are network routes.

Refer to the exhibit. A packet destined for host 128.107.0.5/16 is processed by the JAX router. After finding the static route in the routing table that matches the destination network for this packet, what does the router do next? answer: performs a recursive lookup to find the exit interface used to forward t he packet Refer to the exhibit. What parent network will automatically be included in the routing table when the three subnets are configured on Router1? answer: 172.16.0.0/16 What type of route is this? answer: a level 1 ultimate network route Refer to the exhibit. Router1 is running IOS version 12.2. What will the network administrator need to do so that packets for unknown child routes of 172.16.0.0 /24 will not be dropped? answer: do nothing, ip classless is on by default Refer to the exhibit. Router B receives a packet with a destination address of 1 0.16.1.97. What will router B do? answer: use the default route Refer to the exhibit. How many routes in this output qualify for use as ultimate routes? answer: 7 Refer to the exhibit. With the ip classless command issued, what will router R2 do with a packet destined for host 172.16.4.234? answer: send packet out Serial 0/0/1 Refer to the exhibit. Which statement correctly describes this network? answer: There is at least one parent and one child route Refer to the exhibit. Router1 has been issued the ip classless command. What hap pens to packets destined to host 172.16.3.10? answer: forward out interface Serial0/0/1 Refer to the exhibit. The network administrator has discovered that packets dest ined for servers on the 172.16.254.0 network are being dropped by Router2. What command should the administrator issue to ensure that these packets are sent out the gateway of last resort, Serial 0/0/1? answer: ip classless 12. What determines if the router implements a classless route lookup process? answer: The command ip classless is enabled on the router. 13. What occurs when no ip classless is implemented on the router? answer: The router will assume it has knowledge of all subnets in the network an d will not search beyond child routes for a better match. Refer to the exhibit. The graphic contains partial contents of the routing table on router E. Router E is running version 12.3 of the IOS and is configured for default routing behavior. Router E receives a packet to forward. Which route in the routing table will be searched first and why? answer: 172.16.0.0/25 because it is the first level 1 route 15. A network is converged and the routing tables are complete. When a packet ne eds to be forwarded, what is the first criterion used to determine the best path in the routing table? answer: the route with the longest address and mask match to the destination Refer to the exhibit. What subnet mask will Router1 apply to child routes of the 172.16.0.0/24 network? answer: # 255.255.255.0 Refer to the exhibit. What protocol was used to distribute the routing informati on for the network 172.16.1.4? answer: RIPv2 18. A route to a destination network is learned from multiple routing protocols. What is used by a Cisco router to select the preferred route to the destination that will be installed in the routing table? answer: administrative distance Refer to the exhibit. When Router D is configured to use a link-state routing pr otocol and is added to the network, what is the first thing that it does to begi n learning the network topology?

answer: It learns about its directly connected networks when its interfaces reac h the up state. 02. What two events will cause a link state router to send LSPs to all neighbors ? (Choose two.) answer: whenever the network topology changes/ upon initial startup of router or routing protocol 03. What is the final step in the link state routing process? answer: SPF computes best path to each destination network SPF computes best path to each destination network answer: all routers in the area have link state databases/ each router in the ar ea floods LSPs to all neighbors Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to router ATL? answer: cost of the link 06. What feature do modern link-state protocols provide to minimize processing a nd memory requirements? answer: splitting routing topologies into smaller areas 07. To achieve network convergence, what three steps does each link state router take? (Choose three.) answer: build a Link State Packet (LSP) .../flood the LSP to all neighbors, .../ construct a complete map of the topology... 08. What speeds up convergence in a network using link-state routing? answer: updates triggered by network changes Why is it difficult for routing loops to occur in networks that use link-state r outing? answer: Each router builds a complete and synchronized view of the network. What are two advantages of using a link-state routing protocol instead of a dist ance vector routing protocol? (Choose two.) answer: Each router independently determines the route to each network./ After t he inital LSP flooding, they generally require less bandwidth to communicate cha nges in a topology. Which algorithm is run by link-state routing protocols to calculate the shortest path to destination networks? answer: Dijkstra Refer to the exhibit. Which statement correctly describes the path traffic would take from the 10.0.0.0/24 network to the 192.168.1.0/24 network if a link-state routing protocol was in use? answer: BOS -> ORL -> JAX -> ATL because this path is the lowest cost 13. Which database or table must be identical on all link-state routers within a n area in order to construct an accurate SPF tree? answer: link-state database 14. Which two routing protocols use Dijkstra s shortest path first algorithm? (Cho ose two.) answer: # IS-IS/ OSPF 15. When are link-state packets sent to neighbors? answer: when a link goes up or down Refer to the exhibit. What does JAX do with link-state packets from ORL? answer: sends out the individual link-state packets out the interface connected to B 17. A new network administrator is given the task of selecting an appropriate dy namic routing protocol for a software development company. The company has over 100 routers, uses CIDR and VLSM, requires fast convergence, and uses both Cisco and non-Cisco equipment. Which routing protocol is appropriate for this company? answer: OSPF 18. What action does a link-state router take immediately upon receipt of an LSP from a neighboring router? answer: floods the LSP to neighbors Refer to the exhibit. If all routers and interfaces are configured to use a link -state routing protocol, from which routers will router D receive hello packets? answer: B and C

Refer to the exhibit. What does the O*E2? from the O*E2 0.0.0.0/0 [110/1] via 192. 168.1.1, 00:05:34, Serial0/0? line represent? answer: an external OSPF route that will not increment in cost. Refer to the exhibit. What is the cost of the route to the 10.0.0.0 network? answer: 1768 03. What three parameters must be indentical between OSPF routers in order to fo rm an adjacency? (Choose three.) answer: area id/ hello interval/ network type 04. What does OSPF use to reduce the number of exchanges of routing information in networks where large numbers of neighbors are present? (Choose two.) answer: designated router/ backup designated router 05. What does OSPF use to calculate the cost to a destination network? answer: bandwidth 06. A fully converged five router OSPF network has been running successfully for several weeks. All configurations have been saved and no static routes are used . If one router looses power and reboots, what information will be in its routin g table after the configuration file is loaded but before OSPF has converged? answer: Directly connected networks that are operational will be in the routing table. Refer to the exhibit. Router A is correctly configured for OSPF. Which OSPF conf iguration statement or set of statements was entered for router B to generate th e exhibited routing table? answer: B(config-router)# network 192.168.1.0 0.0.0.3 area 0 Refer to the exhibit. Which network command or set of commands will cause OSPF t o be enabled for any R1 interface connected to the exhibited subnets? answer: R1(config-router)# network 10.1.0.0 0.0.0.255 area 0 R1(config-router)# network 10.1.1.0 0.0.0.255 area 0/ R1(config-router)# network 10.1.2.4 0.0.0.3 a rea 0 Refer to the exhibit. What does the 2? stand for in the router ospf 2 statement? answer: The number 2 identifies this particular instance of OSPF on this router. All routers have been configured with the interface priorities that are shown. A ll routers were restarted simultaneously. The results of the DR/BDR election are shown. What can be concluded about this network? answer: The highest router ID was most likely determined via an OSPF router-id s tatement or statements. What configuration statements would give the results that are shown in the outpu t of the show ip protocols command? answer: B(config)# router ospf 1B(config-router)# router-id 192.168.1.5 How many OSPF adjacencies must be formed to build the complete topology if a DR or BDR were not elected in this OSPF network? answer: 6 What is the default administrative distance for OSPF? answer: 110 What happens immediately after the following commands are entered on router A? answer: D will remain the DR. C will remain the BDR. All routers are running OSPF. What cost would JAX put in its routing table for t he 10.0.0.0/24 network? answer: 1787 What range of networks will be advertised in the OSPF updates by the command Rou ter1(config-router)# network 192.168.0.0 0.0.15.255 area 100? answer: 192.168.0.0/24 through 192.168.15.0/24 The network administrator wants to set the router ID of Router1 to 192.168.100.1 . What steps can the administrator take to accomplish this? answer: nothing, the router-id of Router1 is already 192.168.100.1 nothing, the router-id of Router1 is already 192.168.100.1 answer: A FULL adjacency is formed. Assuming that the routers have default interface OSPF priorities and no configur ed loopback interfaces, what two roles will router B play on each network segmen t? (Choose two.) answer: DR for network 192.168.1.200/ BDR for network 192.168.1.204

Router1 and Router2 are running OSPF. The show ip ospf neighbor command reveals no neighbors. What is a possible cause? answer: OSPF hello or dead timers do not match. Which command sequence on RouterB will redistribute a gateway of last resort to the other routers in OSPF area 0? answer: RouterB(config)# ip route 0.0.0.0 0.0.0.0 172.16.6.6RouterB(config)# rou ter ospf 10 RouterB(config-router)# default-information originate RouterA, RouterB, and RouterC in the diagram are running OSPF on their Ethernet interfaces. Router D was just added to the network. Routers are configured with the loopback interfaces (Lo 0) that are shown in the exhibit. What happens to th e OSPF DR/BDR after RouterD is added to the network? answer: There is no change in the DR or BDR until either current DR or BDR goes down. Which two statements describe the use of OSPF DR/BDR elections? (Choose two.) answer: Elections are required in broadcast multiaccess networks./ Elections are sometimes required in NBMA networks. The routers in the exhibit are using default OSPF configuration settings to adve rtise all attached networks. If all of the routers start at the same time, what will be the result of the DR and BDR elections for this single area OSPF network ? (Choose three.) answer: Router A will be DR for 10.4.0.0/16./ HQ will be BDR for 10.4.0.0/16./ R emote will be DR for 10.5.0.0/16. What must be received between neighbors to prevent the dead time that is shown i n the exhibit from reaching zero? answer: hello packets On a router running EIGRP, what database would maintain a list of feasible succe ssors? answer: topology table This is the debug output from 2 directly connected EIGRP routers. They are not f orming an adjacency. What is the cause? answer: they have different autonomous-system numbers Which command will advertise the 192.168.1.64/30 network but not the 192.168.1.3 2 network on router A? answer: network 192.168.1.64 0.0.0.3 What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Choose two.) answer: query neighbors for a new route/ search topology table for a feasible su ccessor What is indicated by the P at the beginning of the topology entry? answer: the route is in a stable state In which of the following tables does the EIGRP DUAL algorithm store the primary route to a destination? (Choose two.) answer: routing/ topology What information is maintained in the EIGRP topology database for a destination route? (Choose two.) answer: the feasible distance of the route/ the route cost as advertised by the neighboring router Which of the following statements describes the bounded updates used by EIGRP? answer: Partial updates are sent only to routers that need the information. Host 192.168.1.66 in the network illustrated is unable to ping host 192.168.1.13 0. How must EIGRP be configured to enable connectivity between the two hosts? (C hoose two.) answer: R1(config-router)# no auto-summary/ R2(config-router)# no auto-summary Which two statements describe characteristics of EIGRP? (Choose two.) answer: # EIGRP is a distance vector routing protocol./ EIGRP supports classless routing and VLSM. Based on the output of show ip eigrp neighbors, what are two possible problems w ith adjacencies between Router1 and Router2? (Choose two.) answer: The routers are configured with different EIGRP process IDs./ The serial interfaces for both routers are in different networks.

In the topology table, what do the numbers 3011840 and 3128695 represent? answer: the total metric for that network as advertised by the EIGRP neighbor EIGRP is the only routing protocol enabled on this network. No static routes are configured on this router. What can be concluded about network 198.18.1.0/24 fr om the exhibited output? answer: Packets that are destined for 198.18.1.0/24 will be forwarded to 198.18. 10.6. All interfaces have been configured with the bandwidths that are shown in the ex hibit. Assuming that all routers are using a default configuration of EIGRP as t heir routing protocol, what path will packets take from the 172.16.1.0/16 networ k to the 192.168.200.0/24 network? answer: A,B,E By default, which two metrics are used by EIGRP to determine the best path betwe en networks? answer: delay/ bandwidth Which term defines a collection of networks under the administrative control of a single entity that presents a common routing policy to the Internet? answer: autonomous system The company is using EIGRP with an autonomous system number of 10. Pings between hosts on networks that are connected to router A and those that are connected t o router B are successful. However, users on the 192.168.3.0 network are unable to reach users on the 192.168.1.32 network. What is the most likely cause of thi s problem? answer: The routers are not configured in the same EIGRP routing domain. In the command router eigrp 20, what is the purpose of the number 20? answer: identifies the autonomous system number this EIGRP process will advertis e The show ip eigrp topology command output on a router displays a successor route and a feasible successor route to network 192.168.1.0/24. In order to reduce pr ocessor utilization, what does EIGRP do when the primary route to this network f ails? answer: The backup route to network 192.168.1.0/24 is installed in the routing t able. What administrative distance would a router assign to a default route in EIGRP t hat is learned from a source external to the autonomous system? answer: 170 Network 192.168.0.0/28 goes down. What type of packet does Router2 immediately s end to Router1 and Router3? answer: unicast update packets to 192.168.1.1 and 192.168.2.1 Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b 3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical

8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask 8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64 8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless 8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two 8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct

8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r. answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process. answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem? answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument

answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data. answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides? answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer . answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080 8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol 8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal? answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network

medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true? answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch? answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks 8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer? answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means

answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain 8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation 8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers? answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN? answer: a. The source device encapsulates data in a frame with the MAC addre ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______

answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI? answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps 8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm 8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer? answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets?

answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename 6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting? answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 5.9.ARP stands for __________ Answer: A. Address Resolution Protocol

5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax 6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte 14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization 17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record. alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic 25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address? Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute

Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email.

Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC

Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star 5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security 11. Which topology requires a multipoint connection? answer (d): Bus

12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added 20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer? Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport 28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero 31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves

32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________. Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise 49. A sine wave is ________. Answer: d. Periodic and continuous

50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise 55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line 63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem?

Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude? Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI 73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation. Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude 84. Which of the following is most affected by noise? Answer: d. ASK

85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases 89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above

102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________. Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM

119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM 120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications. Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial 125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light 129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables 133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than 136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic

137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index 140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical 143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch?

Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC 160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub

that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______. Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end 175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______. Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6 182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL 185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data 187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit.

189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder 195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded 205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction

206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error? Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are 210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets.

Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation 249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______. Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling

255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent 263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d

ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP 278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer. Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame. Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC) 299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is

called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID. Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical 311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing. Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit. Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station

. Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the 332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium 336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b) 340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length. Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches.

Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine 366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?

Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above 386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment? Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______. Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c) 403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952

406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network 413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP 423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? 1 Answer: c. n 425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing 427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open

429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB 451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router.

Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______. Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited 461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket 473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome

478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port 486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______. Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate

495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT 499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP 503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. Answer: c. Scalability 506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper 507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate.

508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above 511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio 513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error. Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time. Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open 522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent

523. The server program is _______ because it is always available, waiting for a client request. Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open 527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time. Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program 535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for?

Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er. Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative 541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain 544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain

to resolve its IP address? Answer: b. kenz.acct.sony.jp 551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true. 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once 555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding 561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type 562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG 563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type 565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email. Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above 568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above 575. A request message always contains _______. Answer: d. A request line and a header 576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number 577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c

ontains the _______ method. Answer: a. PUT 579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents 581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP 583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response 587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? Answer: c. Static

592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head 593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute 595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above 597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE 603. Which category of HTML tags allows the listing of documents? Answer: c. List 604. A program can use _______ to write a CGI program. Answer: d. Any of the above 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static

606. The server receives input from a browser through _______. Answer: b. A form 607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML 609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression 618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______.

Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file. Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive 628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode 632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only 633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm

634. Before a message is encrypted, it is called _______. Answer: d. Plaintext 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher 637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key 639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above 642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509 647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos

648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS 655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce 658. A _______ certifies the binding between a public key and its owner. Answer: c. CA 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers.

Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS 665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH 668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______. Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer level. Answer: c. IPSec

673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy. Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS 678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid 681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits 5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses.

Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets 10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded? Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol? Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop? Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above. 11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol.

Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP? Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______. Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited 3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der? Answer: C) Length of header 9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence 12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application program. Answer: C) Socket 15 INCORRECT The _______ field is used to order packets of a message. Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea

Answer: A)

Sequence number

16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission 21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? Answer: D. EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25 Answer: C. Centronics-50 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD

8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Answer: C. Repeater 9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment 10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory 12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? Answer: C. Coax 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer: A. Print server 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike

19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation. Answer: B. RG-58 3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus 7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP 12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________.

Answer: 15. over a Answer: 16. used on Answer: 17. Answer:

D. Broadband communications What is the primary advantage to network attached storage (NAS) devices traditional server? B. NAS devices are less expensive. An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500

18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network? Answer: B. NIC In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi

ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP

RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash 14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention? answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS

17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server 19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM? answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash 26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use? answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet. Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address.

If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time. What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination?

answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs? answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers? answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP? answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1

answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error? answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu

ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0 Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing? answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table? answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards? answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM. Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries?

answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay. When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20 Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires? answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing? answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward

Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2 Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree 003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors 004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field.

answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size 009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching? answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1 016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP 020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec 021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process 022. Those followings: a) Slow start; b) Congestion avoidance

c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control 023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet. answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____

answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8 Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011 The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______. answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium The information to be communicated in a data communications system is the ______ . answer: Message

Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented _____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP

Thick Ethernet can be extended to _____ meters per segment answer: 500 _____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____ answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___ _ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____

_ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called .. answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise ______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer

Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only

Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26

How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37

Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching?

Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching

Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ...

Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing.

Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS

Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded.

Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs

Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors

Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0.

Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 .

In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP protocol for communication over point .

Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 . . meters per segment.

What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. . .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers

Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires

Answer:

all nodes to know link costs to their neighbours

In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec

11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da

ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder

6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix

12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document

Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide

ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?-----------------------------

Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou

ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME

3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours

5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer.

Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is

Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer

Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are

According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP

In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet

A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit

Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver

In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i

n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented

The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others

SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame?

Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ .

Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet

Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time

Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose

s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others

_______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily

One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet

Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity?

answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3

What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14

On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search:

Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible.

Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection

Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59

FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords.

Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81

Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92

which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity?

Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP

Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply

message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136

IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are .

Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 protocol for communication over point .

In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means . . meters per segment.

Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream Question 180 of bytes and allows the r handshaking. . .

In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them

In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP

8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram?

Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type

of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b

7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket

10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay

er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC?

Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are

2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document

Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica

l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics

5. Answer: 6. Answer:

What network device decreases collision switch Transceiver _____specifies a physical star topology central hub . Twisted-pair

Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and

electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1

9. Answer: 10. Answer: 11. Answer: 12. Answer:

Repeaters function in the layer Physical Which cable type used for segment lenth more than 2000m. Fiber optics What network device decreases collision switch Transceiver _____specifies a physical star topology central hub . Twisted-pair

Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections

6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP

The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily

Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i

nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP

28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this?

Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62

Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N

How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment

What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is

Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted?

Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket

In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented

Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi

th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not

What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header

With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA

when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs

The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct

Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________

Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university

Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time

Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s)

Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock.

answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum

1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process.

Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19

The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20?

Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram.

Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.

Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64

What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol?

Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data

Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe

r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic

Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header

Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header:

Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 .

Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 .

In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 meters per segment. protocol for communication over point

What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 . . .

Communication in TCP is Answer: full-duplex Question 175

TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking.

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP

Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station

______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is

: Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer.

Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process .

Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses?

Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer.

Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63

20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems?

Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following? Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation? Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed? Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion?

Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps? Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching? Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets? Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers? Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity? Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols? Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur?

Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers? Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router? Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates? Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded? Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27? Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list? Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs?

Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2? Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address? Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing? Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates. Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector

Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network? Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1 Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer? Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure? Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following? Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs? Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh

aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off? Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols? Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork? Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric

How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table? Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol

Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request? Answer: #Ping Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm 1.You want to create a message to let people know a little something about the n etwork or router when they log on - what command enables you to do this? answer: banner motd 1. What is the IP address used to test a PC s network card that don t need connect P C to another PC? answer: all are correct 2. IP is________datagram protocol answer: both a and b Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number Which best describes the function of the Physical Layer? answer: Provides electrical, mechanical, procedural and functional means for act ivating and maintaining links between systems. What best describes the functions of the Application Layer? answer: Defines end-to-end delivery of packets What happens after a collision has occurred on a network after the jam signal is sent? answer: All stations stop sending frames for a randomly selected time period Which network device offers full-duplex, dedicated bandwidth to segments or desk tops? answer: Ethernet switch Why has a layered network model been developed? answer: Accelerates evolution, ensures interoperable technology and facilitates modular engineering. Which technique controls the amount of unacknowledged data in transit at any one time and helps enable TCP reliability? answer: Windowing If a Class B network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? answer: 14 During data transmission, which technique does TCP use in conjunction with windo wing to guarantee that a stream of data sent from one device will be delivered t o another device without duplication or data loss? answer: Acknowledgement and retransmission Which Layer of the OSI model is concerned with the topology of a network? answer: Data Link Which network device provides internetworking and broadcast control? answer: Router Where is the Layer 2 address found on a workstation? answer: On the network interface card What are the most common LAN technologies used in networking today? answer: Ethernet, token ring, FDDI Which of the following is true about a CSMA/CD network? answer: One node's transmission traverses the entire network and is seen and che cked by every node. Which Layer of the OSI model provides data representation and code formatting?

answer: Presentation Layer What correctly describes the five conversion steps of data encapsulation? answer: Data-segments-packets-frames-bits Which OSI Layer determines best path selection? answer: Network Layer Host A and host Z are on different subnets. If an ARP request is sent from host A in search of host Z's MAC address, what will happen? answer: There will be no response. Which Layer of the OSI model handles data encryption? answer: Presentation Routers make forwarding decisions based on which kind of address? answer: logical Which Cisco IOS command is used to enter privileged mode? answer: enable What is the default user-mode prompt for a Cisco router? answer: Router> What do WAN Data link protocols describe? answer: How frames are carried between systems What is the meaning of a caret symbol (^) after entering a command on a Cisco ro uter? answer: It indicates the location of an error in a command string What best describes Frame Relay? answer: Uses high quality digital facilities with no error correction Which layers of the OSI model do WAN standards describe? answer: Physical and data link Which is an example of a data circuit terminating equipment (DCE)? answer: Modem What is the prompt of a Cisco router in the priviledged mode? answer: Router# Which packet-switched service is more efficent than X.25? answer: Frame Relay If you are unsure of the options (subcommands) for a command, which keystroke(s) should you try on the user interface of a Cisco router? answer: B. ? What do you press to view the next screen if --More-- is indicated at the bottom of the current screen on a Cisco router user interface? answer: The spacebar Which memory component of a router loses its content when the router is turned o ff? answer: RAM What can only be done in privileged mode on Cisco routers? answer: Change the configuration Which character is used to enter the help mode? answer: ? Which protocol does a WAN use to make path determination decisions? answer: IP Which WAN protocol supports point-to-point and multipoint configurations? answer: HDLC Which of the following WAN technologies is a Circuit-Switched Service? answer: Narrowband ISDN Which of the following WAN technologies is a Cell-Switched Service? answer: Asynchronous Transfer Mode Which of the following are stored in NVRAM? answer: Configuration Files What do the WAN Physical Layer standards describe? answer: Interface between DTE and DCE Which keystroke will recall the previous command entry on a Cisco router user in terface? answer: Up arrow Which service does a WAN provide to LANs?

answer: Exchange of data packets between routers and the LANs they support In which Layer of the OSI Model do WAN routers operate? answer: Network Layer When working with Cisco IOS, at which level of access are users able to view rou ter status but are unable to change router configuration? answer: User mode Which Cisco IOS command shows the configuration file stored in NVRAM? answer: show startup-config Which external configuration source is used with a modem? answer: Auxiliary Port The show interface serial Cisco IOS router command can display which one of the following lines of information? answer: Serial1 is up, line protocol is up. Which router component stores configuration files even when power is off? answer: NVRAM What is the router prompt for the interface configuration mode? answer: Router(config-if)# Which protocol is used to show summary configuration information about a directl y connected Cisco router? answer: Cisco Discovery Protocol Which Cisco IOS command is used to show current telnet connections? answer: show sessions What is the correct command to go from the user EXEC mode to the privileged EXEC mode? answer: enable Which Cisco IOS command displays routing table entries? answer: show ip route What is stored in working RAM and is constantly updated when the router is worki ng properly? answer: Routing Table When is the configuration file loaded into RAM? answer: Each time the router is initialized Which command will indicate the status of IP, IPX, and AppleTalk? answer: show protocols What is the first thing the router does when power is turned on? answer: Executes a bootstrap program Which port is used to initially configure a router? answer: Console Which response to the appropriate show command indicates an operational serial l ink? answer: Serial1 is up, line protocol is up Someone got into a router configuration file and changed the password to access privileged mode. Which mode on the router enables you to recover passwords? answer: RXBOOT How many Telnet sessions can a Cisco router have simultaneously? answer: 5 Which Cisco IOS command shows the amount of NVRAM memory used for the backup con figuration file? answer: show startup-config Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which command shows the status of Ethernet, Serial, BRI, and other ports? answer: show interfaces Which router component is responsible for the power-on bootstrap sequence? answer: ROM Which command displays information about the current Cisco IOS software version running on a router? answer: show version In which OSI Layer does the Cisco Discovery Protocol (CDP) operate?

answer: Layer 2 Which Cisco IOS command displays the backup configuration file stored in NVRAM? answer: Router# show startup-config While in setup mode on a Cisco router, what is used to display default settings for configuration purposes? answer: square brackets - example [yes] What is the first global configuration parameter set when using the setup mode? answer: host name of the router What is the function of the erase startup-config command? answer: It deletes the configuration file in NVRAM You have connected a new LAN and made appropriate changes to your Cisco router c onfiguration. What command do you issue to save the new version of the configura tion file to NVRAM? answer: copy running-config startup-config Which command will save an active configuration? answer: copy running-config startup-config How does the router prompt appear when you are in global configuration mode? answer: Router(config)# Where is the next place a router looks if it cannot find the IOS image in flash? answer: TFTP What is the function of the reload command? answer: It reboots the router Which of the following is the correct order in which a router boots and looks fo r files? answer: 1,5,7,6,2,4,3 When setting passwords for vty 0 4, what are you setting a password for? answer: Telnet sessions What is an important function of the power-up self test (POST)? answer: Executes diagnostics that verify the basic operation of router hardware Which password is encrypted in the configuration file by default? answer: Enable secret Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is an important result of the configuration file loading onto a router? answer: Starts routing processes, supplies addresses for interfaces, and sets up media characteristics Where is the configuration file saved when you complete the setup process? answer: NVRAM Once you have selected an interface to configure, which prompt would be on the s creen? answer: Router(config-if)# You want to create a message to let people know a little something about the net work or router when they log on - what command enables you to do this? answer: banner motd Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C Which command is used to copy a system image to a network server? answer: Router# copy flash tftp Which configuration register mode is used to tell the router to boot answer: 0x---1 Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename Which command can be used to check the amount of system memory available? answer: Router# show flash In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets Which type of addressing scheme is formed by MAC addresses? Answer: @A. flat

Which address(es) appear in an IP packet's header? Answer: source and destination addresses Which of the following is a benefit of network segmentation? Answer: reduced congestion Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? Answer: 205.255.170.205 Which octet(s) are assigned locally in a class B address? Answer: The third and fourth octets are assigned locally What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? Answer: 6 What must be used to allow the rest of the Internet to see our organization as a single network, but allow routing inside our network? Answer: subnets Which class of network addresses allows the borrowing of 15 bits to create subne ts? Answer: Class A Which part of a network layer address does the router use during path determinat ion? Answer: the network address Which of the following represents the use of binary ones in a subnet mask? Answer: subnet and network bits How large is the network/subnet portion of a Class B license having a subnet mas k of 255.255.240.0? Answer: 20 bits How many bits are in an IP address? Answer: 32 How many total subnets can be created if four bits are borrowed from the host fi eld? Answer: 16 What is specified by the network number in an IP address? Answer: the network to which the host belongs Which of the following assists devices on the same network in determining a pack et's final destination? Answer: host ID Which of the following would be the largest possible number expressed by an 8 bi t binary number? Answer: 11111111 Which of the following best describes the address 139.219.255.255 in an unsubnet ted environment? Answer: Class B broadcast address The IP address for a router interface should be part of what? Answer: the network attached to the interface When sending data to a host on a different network, the source host encapsulates data so that it contains what destination address in the IP header? Answer: IP address of the destination host What is the correct term for when routes are learned automatically? Answer: dynamic routing What do bridges and switches use to make data forwarding decisions? Answer: physical addresses Which is an example of a Layer 3 internetworking device that passes data packets between networks? Answer: router Which type of routing protocol is RIP? Answer: distance vector Router ARP tables hold information from which of the following? Answer: all networks connected to them What is the most common protocol used to transfer routing information between ro uters located on the same network?

Answer: RIP In a connection-oriented system, what happens before any user data is transferre d? Answer: a connection is established between the sender and receiver What happens if a data packet reaches a router that is destined for a network wi th which that router is not directly connected? Answer: The router forwards the packet to another router that most likely contai ns information about the destination. Which of the following contains a unique network number that is used in routing? Answer: IP address Which protocol is used to dynamically assign IP addresses? Answer: DHCP Connection-oriented network processes are often referred to as what? Answer: circuit switched Which describes the changes made to a packet's IP destination address, as that p acket is passed from router to router on it's way to the destination host? Answer: The destination IP address never changes. Which protocol can find the MAC address of a computer given its IP address? Answer: ARP Why is a static route the preferred method for reaching stub networks? Answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? Answer: proxy ARP Which is an example of a routed protocol? Answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? Answer: transport What do routers use to exchange routing tables and share route information? Answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? Answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? Answer: IGRP In a connectionless system, which of the following is correct? Answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? Answer: IP What are the two proprietary routing protocols developed by Cisco? Answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? Answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? Answer: the domain The Telnet application works mainly at which layers of the OSI model? Answer: application, presentation, and session Which application layer protocol supports e-mail programs? Answer: POP3 What is the language used to create web pages? Answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? Answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? Answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses?

Answer: IP address Which protocol is designed to download or upload files on the Internet? Answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? Answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? Answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? Answer: downloading a web page What type of server is used to translate a domain name into the associated IP ad dress? Answer: DNS E-mail addresses consist of which two parts? Answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? Answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? Answer: hyperlink What is the data-link destination address of a broadcast message? Answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? Answer: All devices look at the request and ONLY host B will reply with the MAC address Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? Answer: Session Which best describes the structure of a MAC address? Answer: 24 bit vendor code plus 24 bit serial number

3. In classless addressing,_______is assigned to an organization. answer: A variable-length block-----8.Which layer does ICMP reside in? answer: Physical 8. DHCP is used to answer: Assign IP addresses automatically 8. What is protocol used to inform errors concerning IP? answer: ICMP 8. In classless addressing, the ______ is another name for the common part of t he address range. answer: prefix 8. In classless addressing, the _______ is the varying part (similar to the host id). answer: suffix 8. classless addressing, the prefix length defines the ____. answer: mask 8. The number of addresses assigned to an organization in classless addressing _ __. answer: must be a power of 2 8.The first address assigned to an organization in classless addressing ____. answer: must be evenly divisible by the number of addresses 8. Which address could be the beginning address of a block of 32 classless addre sses? answer: 2.4.6.64

8. Which address could be the beginning address of a block of 16 classless addre sses? answer: none of the above 8. Which address could be the beginning address of a block of 256 classless addr esses? answer: 2.4.6.0 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. What is the data unit used in TCP? answer: segment 8.What is the service that the UDP protocol provides? answer: Guaranteed delivery 8. What flag is used to close TCP connection? answer: FIN 8. Because the sending and the receiving processes may not write or read data at the same speed, TCP______ answer: Uses buffers 8. The difference between TCP and UDP is primarily answer: One is connection-oriented, one is connectionless 8.TCP allows the sending process to deliver data as a_____of bytes and allows th e receiving process to obtain data as a_____of bytes. answer: Stream;stream 8.TCP uses______________to check the safe and sound arrival of data. answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. answer: Reliable 8. What is the combination of an IP address and a port number called? answer: a socket 8. The bytes of data being transferred in each connection are numbered by TCP. T he numbering starts with a answer: Randomly generated number 8. ______is used to compress video. answer: JPEG 8.According to the Nyquist theorem, we need to sample an analog signal______time s the highest frequency. answer: Two 8. ______is more powerful and complex than______. answer: IMAP4;POP3 8. What does the URL need to acess a document answer: All are correct 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A_____document is created by a Web server whenever a browser requests the do cument. answer: static 8. With WWW as an example of client-server computer software, the server is: answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video file s. answer: Streaming stored 8. In______resolution, the resolver expects the server to supply the final answe r. answer: Recursive 8. By default, FTP uses which ports? answer: 20 and 21 8. Currently two message access protocols are available:_____ and_____. answer: POP3;IMAP4 8. With WWW as an example of client-server computer software, the client is: answer: The machine that you use to display WWW documents 8. At the CRC generate, ___ added the data unit before division process.

answer: Os are 8. What type of routing algorithm that OSPF use? answer: Shortest Path Routing 8. The bytes of data being transferred in each connection are numbered by TCP. T he number starts with a answer: randomly generated number 8. The ___ model shows how the network functions of a computer ought to be organ ized. answer: OSI 8. ___ audio/video refers to on-demand request for compressed audio/video files. answer: streaming live 8. The physical layer is concerned with the movement of ___ over the physical me dium. answer: bits 8. What is the protocol that network devices (for example: modem ADSL) use to as sign IP address to PCs in LAN automatically? answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of er rors is this? answer: multiple-bit 8. HDLC is a ___protocol answer: bit-oriented 8. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompr essed. How long does it take to transmit it over a 1-Mbps cable modem? answer: 18874 sec 8. What type of routing protocol that BGP is? answer: Distance Vector Routing 8. A bridge has access to the ___ address of a station on the same network. answer: none is correct 8. The ___ layer is responsible for the delivery of a message form one process t o another. answer: none is correct 8. With WWW as an example of client-server computer software, the client is answer: The machine that you use to display WWW documents 8. Routers function in the ___ layers. answer: physical, data link, and network 8. The purpose of MTA is answer: Transferal of message across the Internet 8. A ___ document is created by a Web server whenever a browser requests the doc ument answer: active 8. What type of service that VC network provides? answer: Connection-oriented 8. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel t hat has a 4-msec one-way delay. What is the line efficency? answer: 6.5% 8. ___ is more powerful and complex than ___ answer: IMAP4;POP3 8. TCP allows the sending process to deliver data as a ___ of bytes and allows t he receiving process to obtain data as a ___ of bytes. answer: stream;stream 8. TCP uses ___ to check the safe and sound arrival of data. answer: an acknowledgment mechanism 8. In the OSI model, as a data packet moves from the lower to the upper layers, headers are___ answer: removed 8. Which IP option is used if exactly four specific router are to be visited by the datagram? answer: strict source route 8. What is the service that the UDP protocol provides?

answer: guaranteed delivery 8. In the OSI model, encryption and decryption are function of the ___ layer. answer: presentation 8. Which device can amplify and make free- noise signal to all computer in LAN? answer: all three devices 8. What is information used to route packet in network? answer: destination address and source address fields in IP header 8. Because the sending and the receiving processes may not write or read data at the same speed. TCP ___ answer: uses buffers 8. The difference between TCP and UDP is primarily answer: one is connection-oriented, one is connectionless 8. In classless addressing, ___ is assigned to an organization. answer: a fixed number of blocks 8. In ___ resolution, the resolver expects the server to supply the final answer . answer: recursive 8. By default, FTP uses which ports? answer: 80 and 8080 8. What is NIC? answer: A printed circuit board that provides network communication 8. What must computers on a network have in common in order to directly communic ate with each other? answer: Use the same protocol 8. What is LAN? answer: A network that connects workstations, terminals, and other devices a geo graphically limitted area. 8. What do WAN do? answer: Operate over a large geographic area 8. What type of numbering system is characterized by ones and zeros? answer: Binary 8. Which numbering system is based on powers of 2? answer: Binary 8. What is the decimal number 151 in binary? answer: 10010111 8. What is the binary number 11011010 in decimal? answer: 218 8. Bandwidth is described in _________? answer: Bits per second 8. What term is use to describe the rated throughput capacity of a given network medium or protocol? answer: Bandwidth 8. Which layer offers provisions for data expedition, class of service, and exce ption reporting? answer: Session 8. Which of the following is the PDU for the transport layer? answer: Segment 8.Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs? answer: Network Layer 8. Which layer of the OSI model is responsible for reliable network communicatio n between end nodes answer: Transport Layer 8. Which of the following best describes the function of the presentation layer? answer: Concerned with data structures and negotiation data transfer syntax 8. What functions are the data link layer concerned with? answer: Physical addressing, network topology, and media access. 8. Which of the following protocols uses UDP as its underlying protocol? answer: TFTP 8. Which of the following statements regarding TCP/IP is true?

answer: b. TCP/IP combines the OSI data link and physical layers into one l ayer 8. Packets are encapsulation in frames at which layer of the OSI model? answer: Data link 8. In the TCP/IP model which layer would deal with reliability, flow control, an d error correction? answer: Transport 8. A NIC is considered an OSI layer _____ device answer: Two 8. A hub is an OSI layer ____ device answer: One 8. Which of the following is true concerning a bridge and its forwarding decisio ns? answer: They operate at OSI layer 2 and use MAC addresses to make decisions. 8. Which of the following is true concerning the function of a switch? answer:Combines the connectivity of a hub with the traffic regulation of a bridg e 8. What do routers connect? answer: two or more networks 8. What does a router route? answer: Layer 3 packets 8. What is the correct order of encapsulation? answer: Data, segment, Packet, Frame, Bits 8. Which LAN topology connects all workstations to a central point, usually a hu b or a switch? answer: Star 8. When connecting four host computers in a LAN what is the minimum hardware nee ded to be used for file sharing capability? answer: Hub 8. If 4 hosts are connected to a hub and then to the Internet, how many IP addre sses are required for these 5 devices? answer: four 8. What kind of power is supplied to the microchips on the motherboard of a comp uter? answer: DC 8. Where is the safely ground connected for a computer? answer: Exposed metal parts 8. Electrons flow in ___ loops called ____ answer: Closed, circuits 8. A half duplex circuit means answer: Only one side can talk at a time 8. Attenuation means answer: A signal losing strength to its surroundings 8. Which of the following is an external source of electrical impulses that can attack the quality of electrical signal on a cable? answer: a. EMI caused by electrical motors 8. What is the primary cause of crosstalk? answer: d. Electrical signals from other wires in a cable 8. Which of the following describes cancellation? answer: Cancelation is a commonly used technique to protect the wire from undesc rible interference 8. What is it called when two bits from two different communicating computers ar e on a shared medium at the same time? answer: Collision 8. ____ means converting binary data into a form that can travel on a physical c ommunications link answer: Encoding 8. The network area within which data packets originate and collide is called a _____? answer: Collision domain

8. What happens to packets that are involved in a collision? answer: b. The Packets are destroyed bit by bit 8.What is another name for a rollover cable? answer: c. A console cable 8. Using repeaters ____ the collision domain answer: Extends 8. What does the twisting of the wires do in a CAT-5 cable? answer: c. Reduce noise problems 8. Which best describes a collision in a Ethernet network? answer: b. The result of two nodes transmitting at the same time 8. How many collision domains exist in a network containing two hubs? answer: One 8. Seperating collision domains with bridges, switches and routers is called ___ _ answer: Segmentation 8. Which best describes bus topology? answer: b. All of its nodes connected directly to one physical link 8. Which of the following best describes an extended star topology? answer: a. LAN topology where a central hub is connected by a vertical cabl ing to other hubs 8. Which LAN standard specifies an implementation of the physical layer and the MAC sub layer of the data link layer in Ethernet networks? answer: IEEE 802.3 8. Which is not one of the recognized IEEE sublayers? answer: Data link control 8. Why did the IEEE create LLC? answer: a. To meet the need to have part of the datalink layer function be independent of existing technologies 8. Convert the decimal number 2989 to Hex answer: BAD 8. Convert the hex number ABE into decimal answer: 2750 8. Convert the binary number 11100010 to hex answer: E2 8. Which of the following statements best describes communication between two de vices on a LAN? The source device encapsulates data in a frame with the MAC addre answer: a. ss of the destination device, transmits, everyone on the LAN sees it, but the de vices with non-matching addresses otherwise ignore the frame 8. A frame is a ______ answer: layer 2 PDU 8. How does a computer on a LAN detect an error in a frame? answer: c. Compare a FCS in the frame to one that the computer calculates f rom the contents of the frame 8. Which is true of a deterministic MAC protocol? answer: c. It allows hosts to take their turn for sending data 8. Which of the following describe Token-Ring? answer: a. Data transfer rates of 4 Mbps or 16 Mbps 8. The data/command frame and token frame have which of the following fields in common? answer: c. Start delimiter, access control, and end delimiter 8. What is the difference between single-mode and multi-mode FDDI? answer: All 1,2,3 8. One of the primary reasons FDDI is extremely reliable is because ____? answer: d. Of it s dual ring design 8. If you hava to connect a FDDI between buildings, which mode of fiber would you use? answer: single-mode 8. Which of the following is an accurate description of an Ethernet variety? answer: a. 10BASE T uses and transmits at 10 Mbps

8. The Ethernet version 2 header is ____ the header of an 802.3 frame answer: c. The same length as 8. Which of the following is true regarding 10BASET signals? answer: c. Designed to send and receive signals over a segment that consist s of 4 wires 8. A _____ diminishes the traffic experienced by devices on all connected segme nts, because only a certain percentage of traffic is forwarded answer: Bridge 8. Which of the following best describes a broadcast storm? answer: b. When too many broadcasts are sent out over the network 8. If Acme Inc. occupies the first three floors of a building and each floor is 1500 square meters, how many wiring closets should be installed according to EIA /TIA 569? answer: six 8. Which of the following is a specification for walls, floors, and ceilings of a wiring closet? answer: c. Interior walls on which equipment is to be mounted should be cov ered with 1.9 cm plywood that is raised away from the underlying wall a minimum of 4.4 cm 8. Which of the following is a requirement for room and equipment access in a wi ring closet? answer: b. The wiring closet should lock from an outside access in such a w ay that exiting from the room is always possible. 8. What is the purpose of the safety ground in a computer? answer: prevents metal parts from becoming energized with a 8. What best describes a wiring closet specification? answer: The room should be equipped with a single stage sprinkler system. 8.When starting to design a network, what should be the first step in the answer: collecting information about the organization 8. What happens if you touch two objects with different potential voltages? answer: you complete the circuit and get a shock 8. What kind of floor should the wiring room have? answer: tile or other finished surface 8. How can the creation of potentially dangerous circuits between buildings answer: Fiber-optic cable should be used as the backbone of the network. 8. What problem could be caused by a faulty ground wire connection at an outlet that is used by networking equipment? answer: There could be potentially fatal voltages between the LAN's UTP cabling and the chassis of a networking device. 8. Why should fluorescent light fixtures be avoided in wiring closets? answer: They generate outside interference. 2.Which keys are pressed in the escape sequence to terminate the initial configu ration while in setup mode? answer: Ctrl-C 3.Which command is used to copy a system image to a network server? answer: Router# copy flash tftp 4.Which configuration register mode is used to tell the router to boot from ROM? answer: 0x---1 5.Which command is used to tell the router to boot from flash? answer: Router(config)# boot system flash IOS_filename 6.Which command can be used to check the amount of system memory available? answer: Router# show flash 7.In the Cisco IOS name cpa25-cg-1, what does cg represent? answer: Special capabilities and feature sets 8.Where will the router search for the IOS software if there are no boot system commands in NVRAM? answer: Flash 9.Which command is used to change the default configuration register setting?

answer: Router(config)# config-register 10.Which command is used to tell the router to boot from ROM? answer: Router(config)# boot system rom 4.4.Why NAT (Network Address Translation) is used? Answer: A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: A. 2 4.6.Traceroute command uses Answer: A. ICMP 4.7.RIP (Routing Information Protocol) in the Internet uses Answer: A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: *D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: *A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: *B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on 5.6.______is used in Ethernet Answer: *A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 5.9.ARP stands for __________ Answer: A. Address Resolution Protocol 5.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1 Standards for CSMA/CA are specified by which IEEE 802 sublayer Answer: 802.11 2 UDP offers which of the following benefits relative to TCP Answer: UDP consumes fewer computer resources by not maintaining connection stat e 3 What is the purpose of LCP packets Answer: All of the others 4 Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer Answer: Session Layer 5 Which of the following is a Man Answer: WiMax

6 What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? Answer: 2001:480:b6f3 7 A fixed-length packet, the basic transmission unit on hight-speed network, suc h as ATM, is called Answer: Cell 8 Which of the following protocols provides the security for HTTPS Answer: SSL 9 From the list of choices, which of the following media access methods is used for an IEEE 802.5 network Answer: Token Passing 10 Which of the following statements is False of the Sequence Number in TCP head er Answer: It is used for reordering of the octets received 11 Which of the following is not function of the data link layer Answer: Data rate control 12 Which of following term does NOT belong the ToS field of IP Header Answer: Priority 13 In Ethernet frame, the maximum size of the Pad field is Answer: 64 byte 14 Flow control is needed to prevent Answer: overflow of the sender buffer 15 Which of the following is a valid IPv6 address Answer: 2001.0407.b33e.23f4.27de.d34a.aed2.1827 16. The compression standard JPEG is called lossy compression is because of the effect of phase Answer: ?Quantization 17. in the resource records os DNS, which record is also know as an Answer: ?CNAME record. alias record

18. A bridge can increase network effeciency by: Answer: ?Learning and storing the MAC address for each NIC on each side og bridg e and then 19. In a thin ethernet, what typically connect s the NIC s transcevier to the back bone cable? Answer: ? BNCs 20. Which of the following are characteristic of a peer-to-peer network? Answer: ? A computer can be noth client and server. 21. Q931 is a protocol of the H323 protocol stack, it can Answer: ? talking to the gatekeeper 22. TCP uses multiple timers to do it work, when a segment is sent, a timers is started,if the segment acknowledged before the timer expires, the timer is stopp ed, this time is call: Answer: ?Persistence time 23. you are administrator os a small business network. You notice that as you a dd workstations to the network over time the speed of th network.. Answer: ? Replace repeater with hubs. 24. which of the following has the highest possible throughput? Answer: ? Fiber-optic

25. The origin data is 0100, if hamming code is used correct the error, which of the following is the codeword? Answer: ?1001100 26. According to the PPP transition state diagram, options are negotiated in the _____state Answer: ? establish 27. Find the minimum hamming distance for the correction of two errors Answer: ? 6 28. your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m Answer: ? half-duplex. 29. what is a router? Answer: ? a piece of hardware or software that forwards packet sbase on ip addre ss. 30. OSPF multicasts are sent out as what class of address? Answer: ?Class A 31.what is another name for a packet-switching network? Answer: ? store and forward. 32. updates for a satellite s coordinates can be optained on the www. Answer: ?Dynamic 33. An email contains a textual birthday greeting, a picture of cake, and a song what is the content-type? Answer: ? Multipart / mixed 34. Port 110(POP) is what kind of port? Answer: ? Well-Know 35. in the resource records of DNS, which record type is associated with ipv6 ad dress? Answer: ?A record 36. In TCP, when client executes a CLOSE primitive which of following states is NOT client state Answer: ? FIN WAIT 2 37. The _______ field in the MIME header uses text to describe the data in the b ody of the message. Answer: b. Content-Id 38 Which of the following statements is FALSE of the protocol SIP Answer: It allows two-party and multiparty calls 39.The HDLC _______ field defines the beginning and end of a frame. Answer: c. Flag 41 Distance vector routing protocols rely on what metric to determine the best r oute Answer: Hop count 42 The PING and the TRACEROUTE utilities uses protocol Answer: ARP 43 Which layer of the OSI seven-layer model controls the assembly and disassembl y of data Answer: Transport layer 44 Which of the following statements regarding protocol stacks are FALSE Answer: A given protocol stack can run only one computer type 59. If an advertised window for TCP connection is 4000 bytes, MMS 256 is bytes, CWND is 2560 byte, ssthresh is 65 KN Answer: 128 Bytes In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time

Any network that routes packets according to host destination addresses is a ___ _____Datagram network Answer: *C. Virtual-circuit network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not

What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches? Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission

Chapter 1: Introduction 1. In a _______ connection, more than two devices can share a single link. Answer: c. Multipoint 2. Communication between a computer and a keyboard involves ______________ trans mission answer (c): Simplex 3. In a network with 25 computers, which topology would require the most extensi ve cabling? answer (b): Mesh 4. Which topology requires a central controller or hub? answer (a): Star 5. The _______ is the physical path over which a message travels. answer (b): Medium 6. Which organization has authority over interstate and international commerce i n the communications field? answer (d): FCC 7. The information to be communicated in a data communications system is the ___ _____ answer (d): Message 8. Frequency of failure and network recovery time after a failure are measures o f the _______ of a network. answer (c): Reliability 9. In _______ transmission, the channel capacity is shared by both communicating devices at all times. answer (a): Full-duplex 10. An unauthorized user is a network _______ issue. answer (c): Security 11. Which topology requires a multipoint connection? answer (d): Bus 12. A television broadcast is an example of _______ transmission. answer (c): Simplex 13. A _______ connection provides a dedicated link between two devices. answer (b): Point-to-Point 14. A cable break in a _______ topology stops all transmission. answer (d): Bus 15. The _______ layer changes bits into electromagnetic signals. answer (a): Physical 18. As the data packet moves from the lower to the upper layers, headers are ___ ____. Answer: d. Subtracted 19. As the data packet moves from the upper to the lower layers, headers are ___ ____. Answer: b. Added

20. The _______ layer lies between the network layer and the application layer. Answer: c. Transport 21. Layer 2 lies between the physical layer and the _______ layer. Answer: b. Network 22. When data are transmitted from device A to device B, the header from A's lay er 4 is read by B's _______ layer. Answer: c. Transport 23. Which layer functions as a liaison between user support layers and network s upport layers? Answer: b. Transport layer 24. What is the main function of the transport layer? Answer: a. Process-to-process delivery 25. Which of the following is an application layer service? Answer: d. All the above 26. The Internet model consists of _______ layers. Answer: b. Five 27. The process-to-process delivery of the entire message is the responsibility of the _______ layer. Answer: c. Transport 28. The _______ layer is the layer closest to the transmission medium. Answer: b. Physical 29. Before data can be transmitted, they must be transformed to ________. Answer: a. Electromagnetic signals 30. When one of the components of a signal has a frequency of zero, the average amplitude of the signal ________. Answer: b. Is greater than zero 31. A periodic signal can always be decomposed into ________. Answer: c. A set of sine waves 32. A periodic signal completes one cycle in 0.001 s. What is the frequency? Answer: c. 1 KHz 33. In a frequency-domain plot, the horizontal axis measures the ________. Answer: a. Frequency 34. In a time-domain plot, the vertical axis is a measure of ________. Answer: c. Amplitude 35. In a time-domain plot, the horizontal axis is a measure of ________. Answer: b. Time 36. If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, wh at is the highest frequency? Answer: d. 57 KHz 38. What is the bandwidth of a signal that ranges from 40 KHz to 4 MHz? Answer: a. 3.96 MHz 39. As frequency increases, the period ________.

Answer: a. Decreases 40. When propagation speed is multiplied by propagation time, we get the _______ _. Answer: c. Distance a signal or bit has traveled 41. Propagation time is ________ proportional to distance and ________ proportio nal to propagation speed. Answer: c. Directly; inversely 42. Wavelength is ________ proportional to propagation speed and ________ propor tional to period. Answer: a. Directly; directly 43. Which of the following can be determined from a frequency-domain graph of a signal? Answer: c. Frequency 44. Which of the following can be determined from a frequency-domain graph of a signal? Answer: b. Bandwidth 45. In a frequency-domain plot, the vertical axis measures the ________. Answer: b. Peak amplitude 46. Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. Answer: b. Twice 47. The wavelength of green light in air is ________ the wavelength of green lig ht in fiber-optic cable. Answer: b. Less than 48. Using the Shannon formula to calculate the data rate for a given channel, if C = B, then ________. Answer: a. The signal is equal to the noise 49. A sine wave is ________. Answer: d. Periodic and continuous 50. If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ___ _____ V. Answer: c. -2 51. A signal is measured at two different points. The power is P1 at the first p oint and P2 at the second point. The dB is 0. This means ________. Answer: b. P2 equals P1 52. ________ is a type of transmission impairment in which the signal loses stre ngth due to the resistance of the transmission medium. Answer: d. Attenuation 53. ________ is a type of transmission impairment in which the signal loses stre ngth due to the different propagation speeds of each frequency that makes up the signal. Answer: c. Distortion 54. ________ is a type of transmission impairment in which an outside source suc h as crosstalk corrupts a signal. Answer: b. Noise

55. The ________ has units of meters/second or kilometers/second. Answer: c. Propagation speed 56. ________ has units of bits/second. Answer: a. Throughput 57. The ________ has units of seconds. Answer: b. Propagation time 58. The wavelength of a signal depends on the ________. Answer: a. Frequencies of the signal & b. Medium 59. Which encoding technique attempts to solve the loss of synchronization due t o long strings of 0s? Answer: b. BnZS 60. Block coding can help in _______ at the receiver. Answer: a. Synchronization & b. Error detection 61. In _______ transmission, bits are transmitted simultaneously, each across it s own wire. Answer: a. Parallel 62. Unipolar, bipolar, and polar encoding are types of _______ encoding. Answer: b. Line 63. _______ encoding has a transition at the middle of each bit. Answer: d. All the above 64. _______ encoding has a transition at the beginning of each 0 bit. Answer: a. Differential Manchester 65. PCM is an example of _______ conversion. Answer: b. Analog-to-digital 66. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the hig hest frequency at 600 Hz, what should be the sampling rate, according to the Nyq uist theorem? Answer: d. 1200 samples/s 67. One factor in the accuracy of a reconstructed PCM signal is the _______. Answer: a. Number of bits used for quantization 68. In asynchronous transmission, the gap time between bytes is _______. Answer: c. Variable 69. Synchronous transmission does not have _______. Answer: d. All the above 70. Which encoding type always has a nonzero average amplitude? Answer: c. Unipolar 71. Which of the following encoding methods does not provide for synchronization ? Answer: b. NRZ-L 72. Which encoding method uses alternating positive and negative values for 1s? Answer: b. AMI

73. In PCM, an analog-to- _______ conversion occurs. Answer: b. Digital 74. If the maximum value of a PCM signal is 31 and the minimum value is -31, how many bits were used for coding? Answer: c. 6 75. RZ encoding involves _______ signal levels. Answer: c. Three 76. Which quantization level results in a more faithful reproduction of the sign al? Answer: d. 32 77. In _______ transmission, bits are transmitted over a single wire, one at a t ime. Answer: a. Asynchronous serial b. Synchronous serial 78. In _______ transmission, a start bit and a stop bit frame a character byte. Answer: b. Asynchronous serial 79. If a symbol is composed of 3 bits, there are _______ data levels Answer: c. 8 80. The Nyquist theorem specifies the minimum sampling rate to be_______. Answer: b. Twice the highest frequency of a signal 81. Pulse rate is always _______ the bit rate. Answer: b. Less than or equal to 82. AM and FM are examples of ________ modulation. Answer: a. Analog-to-analog 83. In QAM, both phase and ________ of a carrier frequency are varied. Answer: c. Amplitude 84. Which of the following is most affected by noise? Answer: d. ASK 85. ASK, PSK, FSK, and QAM are examples of ________ modulation. Answer: d. Digital-to-analog 86. If the baud rate is 400 for a 4-PSK signal, the bit rate is ________ bps. Answer: b. 800 87. If the bit rate for an ASK signal is 1200 bps, the baud rate is ________ Answer: d. 1200 88. As the bit rate of an FSK signal increases, the bandwidth ________. Answer: c. Increases 89. In 16-QAM, there are 16 ________. Answer: b. Combinations of phase and amplitude 90. Which modulation technique involves tribits, eight different phase shifts, a nd one amplitude? Answer: d. 8-PSK 91. If the bit rate for an FSK signal is 1200 bps, the baud rate is ________.

Answer: d. 1200 92. If the bit rate for a QAM signal is 3000 bps and a signal unit is represente d by a tribit, what is the baud rate? Answer: c. 1000 93. If the baud rate for a QAM signal is 3000 and a signal unit is represented b y a tribit, what is the bit rate? Answer: d. 9000 94. If the baud rate for a QAM signal is 1800 and the bit rate is 9000, how many bits are there per signal unit? Answer: c. 5 95. Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequenc y component at 705 KHz, what is the frequency of the carrier signal? Answer: b. 700 KHz 96. A modulated signal is formed by ________. Answer: a. Changing the carrier wave by the modulating signal 97. If FCC regulations are followed, the carrier frequencies of adjacent AM radi o stations are ________ apart. Answer: b. 10 KHz 98. If FCC regulations are followed, ________ potential FM stations are theoreti cally possible in a given area. Answer: a. 50 99. When an ASK signal is decomposed, the result is ________. Answer: a. An infinite number of sine waves 100. The bandwidth of an FM signal requires 10 times the bandwidth of the ______ _ signal. Answer: d. Modulating 101. Modulation of an analog signal can be accomplished through changing the ___ _____ of the carrier signal. Answer: d. Any of the above 102. For a telephone line, the bandwidth for voice is usually _______ the bandwi dth for data. Answer: b. Greater than 103. For a given bit rate, the minimum bandwidth for ASK is ________ the minimum bandwidth for FSK. Answer: a. Less than 104. What is the object of trellis coding? Answer: c. To reduce the error rate 105. A modulator converts a(n)________ signal to a(n) ________ signal. Answer: a. Digital; analog 106. A 56K modem can download at a rate of _______ Kbps and upload at a rate of ________ Kbps. Answer: a. 56.6; 33.6 107. For FSK, as the difference between the two carrier frequencies increases, t he bandwidth ________.

Answer: Increases 108. The bit rate always equals the baud rate in which type of signal? Answer: a. FSK 109. Which ITU-T modem standard uses trellis coding? Answer: a. V.32 110. In trellis coding the number of data bits is ________ the number of transmi tted bits. Answer: a. Less than 111. Which multiplexing technique transmits digital signals? Answer: c. TDM 112. Which multiplexing technique shifts each signal to a different carrier freq uency? Answer: b. FDM 113. In TDM, for n signal sources of the same data rate, each frame contains ___ ____ slots. Answer: b. n 114. In TDM, the transmission rate of the multiplexed path is usually _______ th e sum of the transmission rates of the signal sources. Answer: b. Greater than 115. DS-1 through DS-4 are _______ while T-1 through T-4 are _______. Answer: b. Services; lines 116. The sharing of a medium and its link by two or more devices is called _____ __. Answer: c. Multiplexing 117. In AT&T's FDM hierarchy, the bandwidth of each group type can be found by m ultiplying _______ and adding extra bandwidth for guard bands. Answer: b. The number of voice channels by 4000 Hz 118. Guard bands increase the bandwidth for _______. Answer: b. FDM 119. Which multiplexing technique transmits analog signals? Answer: a. FDM c. WDM 120. In a T-1 line, _______ interleaving occurs. Answer: b. Byte 121. Which multiplexing technique involves signals composed of light beams? Answer: a. WDM 122. The VLF and LF bands use _______ propagation for communications. Answer: b. Ground 123. Category 1 UTP cable is most often used in _______ networks. Answer: b. Telephone 124. BNC connectors are used by _______ cables. Answer: d. Coaxial

125. Which of the following is not a guided medium? Answer: c. Atmosphere 126. In an environment with many high-voltage devices, the best transmission med ium would be _________. Answer: d. Optical fiber 127. _______ cable consists of an inner copper core and a second conducting oute r sheath. Answer: a. Coaxial 128. In fiber optics, the signal source is _______ waves. Answer: b. Light 129. Smoke signals are an example of communication through _______. Answer: c. An unguided medium 130. Which of the following primarily uses guided media? Answer: c. Local telephone system 131. What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable? Answer: a. Outer conductor 132. The RG number gives us information about _______. Answer: c. Coaxial cables 133. Transmission media are usually categorized as _______. Answer: a. Guided or unguided 134. The _______ is an association that sponsors the use of infrared waves. Answer: b. IrDA 135. In an optical fiber, the inner core is _______ the cladding. Answer: b. Denser than 136. The inner core of an optical fiber is _______ in composition. Answer: c. Glass or plastic 137. When a beam of light travels through media of two different densities, if t he angle of incidence is greater than the critical angle, _______ occurs. Answer: b. Reflection 138. In _______ propagation, the beam of propagated light is almost horizontal, and the low-density core has a small diameter compared to the cores of the other propagation modes. Answer: a. Single-mode 139. _______ is the propagation method subject to the greatest distortion. Answer: b. Multimode step-index 140. In _______ propagation, the core is of varying densities. Answer: c. Multimode graded-index 141. When we talk about unguided media, usually we are referring to _______. Answer: c. The air 142. Transmission media are closest to the _______ layer. Answer: b. Physical

143. Radio wave and microwave frequencies range from _______. Answer: c. 3 KHz to 300 GHz 144. Optical fibers, unlike wire media, are highly resistant to _______. Answer: d. Electromagnetic interference 145. In _______ propagation, low-frequency radio waves hug the earth. Answer: b. Ground 146. When the angle of incidence is _______ the critical angle, the light beam b ends along the interface. Answer: c. Equal to 147. A parabolic dish antenna is a(n) _______ antenna. Answer: d. Unidirectional 148. The telephone service handled between two LATAs is called _______. Answer: b. An IXC 149. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs? Answer: a. 2000 150. The _______ is a device that connects n inputs to m outputs. Answer: a. Crossbar 151. The established telephone company that provided services in a LATA before 1 966 and owns the cabling system is called _______. Answer: c. An ILEC 152. In a crossbar with 1000 crosspoints, approximately how many are in use at a ny time? Answer: b. 250 153. The _______ of a TSI controls the order of delivery of slot values that are stored in RAM. Answer: d. Control unit 154. Which of the following is a time-division switch? Answer: c. Crosspoint 155. In a time-division switch, a _______ governs the destination of a packet st ored in RAM. Answer: a. Control unit 156. A telephone network is an example of a _______ network. Answer: a. Circuit-switched 157. The local loop has _______ cable that connects the subscriber telephone to the nearest end office. Answer: c. Twisted-pair 158. Trunks are transmission media such as _______ that handle the telephone com munication between offices. Answer: a. Twisted-pair cable b Fiber-optic cable 159. A new telephone company that provides services in a LATA after 1966 is call ed _______. Answer: d. A CLEC

160. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number _______ has been punched. Answer: c. 3 161. In _______ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. Answer: a. Time-division 162. Data from a computer are _______; the local loop handles _______ signals. Answer: b. Digital; analog 163. To create a _______, combine crossbar switches in stages. Answer: b. Multistage switch 164. A traditional telephone line has a bandwidth of _______. Answer: b. 4000 Hz Chapter 9 : Flow and Error Control 165. SONET is a standard for _______ networks. Answer: b. Fiber-optic cable 166. _______ limit the bandwidth of the local loop to 4 KHz. Answer: c. Filters 167. The actual bit rate of ADSL downstream data is _______. Answer: c. 500 Kbps to 8 Mbps 168. _______ is a device at the telephone company site that can packetize data t o be sent to the ISP server. Answer: c. A DSLAM 169. The standard for data transmission over an HFC network is called _______. Answer: a. DOCSIS 170. DMT is a modulation technique that combines elements of _______ and _______ . Answer: d. FDM; QAM 171. The _______ is an HFC network device installed inside the distribution hub that receives data from the Internet and passes them to the combiner. Answer: d. CMTS 172. HDSL encodes data using _______. Answer: c. 2B1Q 173. _______ encoded signal is more susceptible to attenuation than _______ enco ded signal. Answer: a. An AMI; a 2B1Q 174. Another name for the cable TV office is the _______. Answer: c. Head end 175. A traditional cable TV network transmits signals ______. Answer: c. Downstream 176. _______ was designed as an alternative to the T-1 line. Answer: c. HDSL 177. The synchronous payload envelope of an STS-1 frame contains _______.

Answer: a. Pointers & b. User data 178. _______ has a higher transmission rate in the downstream direction than in the upstream direction. Answer: a. VDSL & b. ADSL 179. An HFC network uses _______ as the medium from the switch to the fiber node . Answer: c. Optical fiber 180. In an HFC network, the distribution hub handles the _______ of signals. Answer: a. Modulation & b. Distribution 181. A TV channel in an HFC network needs a _______-MHz bandwidth. Answer: b. 6 182. _______ data go from the subscriber to the Internet. Answer: b. Upstream 183. In an HFC network, the upstream data are modulated using the _______ modula tion technique. Answer: b. QAM 184. _______ is suitable for businesses that require comparable upstream and dow nstream data rates. Answer: a. SDSL 185. SONET is an acronym for _______ Network. Answer: c. Synchronous Optical 186. The largest portion of the bandwidth for ADSL carries _______. Answer: b. Downstream data 187. In a SONET system, _______ can remove signals from a path. Answer: a. An add/drop multiplexe Chapter 10 : Access Method 188. Which of the following best describes a single-bit error? Answer: c. A single bit is inverted per data unit. 189. Which error detection method uses ones complement arithmetic? Answer: b. Checksum 190. Which error detection method consists of just one redundant bit per data un it? Answer: c. Simple parity check 191. Which error detection method involves polynomials? Answer: a. CRC 192. If the ASCII character G is sent and the character D is received, what type of error is this? Answer: c. Burst 193. If the ASCII character H is sent and the character I is received, what type of error is this? Answer: c. Single-bit 194. In cyclic redundancy checking, what is the CRC? Answer: a. The remainder

195. Which error detection method involves the use of parity bits? Answer: a. Simple parity check & b. Two-dimensional parity check 196. In cyclic redundancy checking, the divisor is _______ the CRC. Answer: b. 1 bit more than 197. If the data unit is 111111, the divisor 1010, and the remainder 110, what i s the dividend at the receiver? Answer: c. 111111110 198. Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits? Answer: c. Two-dimensional parity check 199. If the data unit is 111111 and the divisor 1010, what is the dividend at th e transmitter? Answer: b. 111111000 200. If odd parity is used for ASCII error detection, the number of 0s per 8-bit symbol is _______. Answer: d. Odd 201. In CRC there is no error if the remainder at the receiver is _______. Answer: d. Zero 202. At the CRC generator, _______ added to the data unit after the division pro cess. Answer: c. The CRC remainder is 203. The sum of the checksum and data at the receiver is _______ if there are no errors. Answer: a. -0 204. In CRC the quotient at the sender _______. Answer: d. Is discarded 205. The Hamming code is a method of _______. Answer: a. Error detection & b. Error correction 206. At the CRC checker, _______ means that the data unit is damaged. Answer: b. A nonzero remainder 207. Which error detection method can detect a single-bit error? Answer: d. All the above 208. Which error detection method can detect a burst error? Answer: a. The parity check & b. Two-dimensional parity check 209. At the CRC generator, _______ added to the data unit before the division pr ocess. Answer: c. 0s are 210. HDLC is an acronym for _______. Answer: c. High-level data link control 211. Flow control is needed to prevent ________. Answer: b. Overflow of the receiver buffer 212. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence

numbers? Answer: c. 0 to 63 213. For a sliding window of size n - 1 (n sequence numbers), there can be a max imum of _______ frames sent but unacknowledged. Answer: b. n 214. When data and acknowledgment are sent on the same frame, this is called ___ ____. Answer: c. Piggybacking 215. In _______ ARQ, if a NAK is received, only the specific damaged or lost fra me is retransmitted. Answer: a. Go-Back-N 222. For Stop-and-Wait ARQ, for n data packets sent, _______ acknowledgments are needed. Answer: c. n 223. What is present in all HDLC control fields? Answer: d. P/F bit Chapter 12 : Wireless Local Area Networks 224. According to the PPP transition state diagram, options are negotiated in th e _______ state. Answer: c. Establishing d. Authenticating 225. According to the PPP transition state diagram, verification of user identif ication occurs in the _______ state. Answer: d. Authenticating 226. PAP requires _______ and _______ from the user. Answer: c. Authentication identification; a password 227. According to the PPP transition state diagram, the link is disconnected in the _______ state. Answer: b. Terminating 228. In the PPP frame, the _______ field defines the contents of the data field. Answer: d. Protocol 229. According to the PPP transition state diagram, exchange of user control and data packets occurs in the _______ state. Answer: a. Networking 230. _______, an (a)_______ protocol, establishes and terminates a network layer connection for IP packets. Answer: b. IPCP; NCP 231. In the PPP frame, the _______ field is similar to that of the U-frame in HD LC. Answer: d. Control 232. In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC. Answer: b. Address 233. What is the purpose of LCP packets? Answer: d. All the above 234. _______ is a three-way handshake for user verification. Answer: b. CHAP 235. A PAP packet and a CHAP packet can be distinguished by the value of the ___ ____ field of the PPP frame. Answer: d. Control 236. In the PPP frame, the _______ field is for error control. Answer: a. FCS 237. CHAP authentication, the user takes the system's _______ and its own ______ _ to create a result that is then sent to the system. Answer: c. Challenge value; password 238. If an FDMA network has eight stations, the medium bandwidth has ______ band

s. Answer: c. 8 239. In the _______ random-access method there is no collision. Answer: b. CSMA/CA 240. In the 1-persistent approach, when a station finds an idle line, it _______ . Answer: a. Sends immediately 241. _______ requires one primary station and one or more secondary stations. Answer: c. Polling 242. In the p-persistent approach, when a station finds an idle line, it _______ . Answer: d. Sends with probability p 243. A network using the CSMA random-access method with p equal to 0.25 will sen d _______ percent of the time after accessing an idle line. Answer: d. 25 244. The 1-persistent approach can be considered a special case of the p-persist ent approach with p equal to _______. Answer: a. 1.0 245. _______ is a random-access protocol. Answer: c. MA 246. In the reservation access method, if there are 10 stations on a network, th en there are _______ reservation minislots in the reservation frame. Answer: a. 10 247. A Walsh table for 16 stations has a chip sequence of _______ chips. Answer: a. 16 248. _______ is a controlled-access protocol. Answer: d. Reservation 249. _______ is (are) a channelization protocol. Answer: d. All the above 250. _______ is the access protocol used by traditional Ethernet. Answer: c. CSMA/CD 251. The most primitive random access method is _______. Answer: b. ALOHA 252. When a collision is detected in a network using CSMA/CD, _______. Answer: c. A jam signal is sent by the station 253. In the _______ random-access method, stations do not sense the medium. Answer: b. ALOHA 254. When a primary device asks a secondary device if it has data to send, this is called _______. Answer: b. Polling 255. If a TDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 256. If a CDMA network has eight stations, the medium bandwidth has _______ band s. Answer: a. 1 257. If an Ethernet destination address is 08-07-06-05-44-33, then this is a ___ ___ address. Answer: b. Unicast 258. What is the hexadecimal equivalent of the Ethernet address 01011010 0001000 1 01010101 00011000 10101010 00001111? Answer: a. 5A-11-55-18-AA-0F 259. Which of the following could not be an Ethernet source address? Answer: b. 8B-32-21-21-4D-34 260. What is the efficiency of 4B/5B block encoding? Answer: b. 80 percent 261. Which of the following could not be an Ethernet unicast destination? Answer: d. 43-7B-6C-DE-10-00 262. What is the efficiency of 8B/10B encoding? Answer: a. 80 percent

263. A 10-station Ethernet LAN uses a _______-port bridge if the effective avera ge data rate for each station is 2 Mbps. Answer: d. 5 264. A _______-station Ethernet LAN uses a four-port bridge. Each station has an effective average data rate of 1.25 Mbps. Answer: d. 32 265. An 80-station traditional Ethernet is divided into four collision domains. This means that a maximum of _______ stations contend for medium access at any o ne time. Answer: a. 20 266. If an Ethernet destination address is 07-01-02-03-04-05, then this is a ___ ___ address. Answer: c. Multicast 267. What is the efficiency of a frame in half-duplex Gigabit Ethernet carrying 46 bytes of data? Answer: b. 70 percent 268. Which of the following could not be an Ethernet multicast destination? Answer: b. 7C-56-21-1A-DE-F4 269. Which of the following is a four-wire Gigabit Ethernet implementation? Answer: c. 1000Base-T 270. Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. W hat is the effective average data rate of each station? Answer: b. 2.5 Mbps 271. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequen cy of the system is _______ GHz. Answer: c. 2.1 272. An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the o riginal signal is 250 MHz, and there are ______ hops per cycle. Answer: a. 4 273. A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz. Answer: d. 100 274. A wireless LAN using DSSS with an 8-bit chip code needs _______ MHz for sen ding data that originally required a 10-MHz bandwidth. Answer: b. 80 275. A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for send ing data that originally required a 20-MHz bandwidth. Answer: b. A 16 276. A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending d ata that originally required a _______-MHz bandwidth. Answer: d. 2.5 277. In an ESS the _______ station is not mobile. Answer: b. AP 278. In an ESS the _______ stations are part of a wired LAN. Answer: b. AP 279. A station with _______ mobility is either stationary or moving only inside a BSS. Answer: a. No-transition 280. _______ combine to form a scatternet. Answer: b. Piconets 281. Bluetooth uses _______ in the physical layer. Answer: c. FHSS 282. A _______ frame usually precedes a CTS frame. Answer: b. RTS 283. A station with _______ mobility can move from one BSS to another. Answer: c. BSS-transition 284. A station with _______ mobility can move from one ESS to another. Answer: b. ESS-transition 285. A _______ frame usually precedes an RTS frame.

Answer: d. None of the above 286. Wireless transmission is _______ prone to error than/as wired transmission. Answer: b. More 287. Which MAC sublayer does IEEE 802.11 define? Answer: d. (b) and (c) 288. What is the basic access method for wireless LANs as defined by IEEE 802.11 ? Answer: c. DCF 289. The access method for wireless LANs as defined by IEEE 802.11 is based on _ _____. Answer: d. CSMA/CA 290. FHSS, DSSS, and OFDM are _______ layer specifications. Answer: c. Physical 291. Stations do not sense the medium during _______ time. Answer: b. NAV 292. A Bluetooth frame needs _______ s for hopping and control mechanisms. Answer: c. 259 293. In the ______ method, the sender hops from frequency to frequency in a spec ific order. Answer: b. FHSS 294. A wireless LAN uses _______ frames for acknowledgment. Answer: c. Control 295. A wireless LAN uses _______ frames for the initial communication between st ations and the access points. Answer: c. Management 296. A Bluetooth network can have _______ master(s). Answer: a. One 297. A bridge forwards or filters a frame by comparing the information in its ad dress table to the frame's _______. Answer: b. Layer 2 destination address 298. Repeaters function in the _______ layer(s). Answer: b. Physical (MAC) 299. A _______ is actually a multiport repeater. Answer: a. Hub 300. A repeater takes a weakened or corrupted signal and _______ it. Answer: d. Regenerates 301. A bridge has access to the _______ address of a station on the same network . Answer: c. Physical (MAC) 302. The bridge with the least-cost path between the LAN and the root bridge is called the _______ bridge. Answer: b. Designated 303. A system with redundant bridges might have a problem with _______ in the sy stem. Answer: c. Loops 304. Bridges function in the _______ layer(s). Answer: b. Data link 305. In a VLAN, stations are separated into groups by _______. Answer: a. Software methods 306. A bridge can _______. Answer: d. Do all the above 307. A _______ bridge has the smallest ID. Answer: d. Root 308. A bridge never forwards frames out of the _______ port. Answer: c. Blocking 309. Which type of bridge builds and updates its tables from address information on frames? Answer: a. Transparent 310. VLAN technology divides a LAN into ______ groups. Answer: d. Logical

311. Which of the following is a connecting device? Answer: d. All the above 312. Which station characteristic can be used to group stations into a VLAN? Answer: d. All the above 313. _______ is a first-generation cellular phone system. Answer: c. AMPS 314. AMPS uses _______ for modulation. Answer: d. (a) and (b) 315. _______ separates the AMPS voice channels. Answer: c. FDMA 316. _______ is a cellular telephone system popular in Europe. Answer: a. GSM 317. D-AMPS uses _______ for multiplexing. Answer: d. (b) and (c) 318. GSM uses _______ for multiplexing. Answer: d. (b) and (c) 319. DSSS is used by the _______ cellular phone system. Answer: b. IS-95 320. _______ base stations use GPS for synchronization. Answer: b. IS-95 321. _______ will have 288 satellites in 12 polar orbits. Answer: a. Teledesic 322. IS-95 has a frequency reuse factor of _______. Answer: c. 1 323. The path that a satellite makes around the world is called _______. Answer: a. An orbit 324. A GEO satellite has _______ orbit. Answer: d. An equatorial 325. Which orbit has the highest altitude? Answer: b. GEO 326. _______ is a second-generation cellular phone system. Answer: d. All the above 327. A _______ is a computerized center that is responsible for connecting calls , recording call information, and billing. Answer: d. Mobile switching center 328. _______ has 48 satellites in six polar orbits. Answer: c. Globalstar 329. The signal from a satellite is aimed at a specific area called the _______. Answer: c. Footprint 330. In _______, a mobile station always communicates with just one base station . Answer: c. A hard handoff 331. MEO satellites orbit _______ Van Allen belts. Answer: d. Between the 332. _______ is often used for navigation purposes. Answer: a. GPS 333. An LEO satellite has _______ orbit. Answer: b. A polar 334. Teledesic is a _______ LEO satellite system. Answer: b. Broadband 335. _______ has 66 satellites in six LEOs. Answer: d. Iridium 336. Transmission from the Earth to the satellite is called the _______. Answer: b. Uplink 337. The _______ is not used for voice communication. Answer: a. GPS 338. _______ is a Frame Relay option that transmits voice through the network. Answer: c. VOFR 339. Frame Relay provides _______ connections. Answer: c. (a) and (b)

340. Routing and switching in Frame Relay are performed by the _______ layer. Answer: c. Data link 341. Frame Relay is unsuitable for ________ due to possible delays in transmissi on resulting from variable frame sizes. Answer: b. Real-time video 342. The Frame Relay address field is _______ in length. Answer: d. Any of the above 343. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order. Answer: b. Uses virtual circuit routing 344. _______ is a protocol to control and manage interfaces in Frame Relay netwo rks. Answer: c. LMI 345. Frame Relay operates in the _______. Answer: a. Physical and data link layers 346. In the data link layer, Frame Relay uses _______. Answer: a. A simplified HDLC protocol 347. The VPI of an NNI is _______ bits in length. Answer: c. 12 348. In data communications, ATM is an acronym for _______. Answer: c. Asynchronous Transfer Mode 349. Which AAL type is designed to support SEAL? Answer: d. AAL5 350. Which layer in ATM protocol reformats the data received from other networks ? Answer: b. Application adaptation 351. Which layer in ATM protocol has a 53-byte cell as an end product? Answer: a. ATM 352. Which AAL type is designed to support a data stream that has a constant bit rate? Answer: a. AAL1 353. The VPI of a UNI is _______ bits in length. Answer: d. 8 354. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order until they reach their destination. Answer: a. Virtual circuit 355. A device called a(n) _______ allows frames from an ATM network to be transm itted across a Frame Relay network. Answer: a. FRAD 356. A _______ provides a connection or a set of connections between switches. Answer: b. Virtual circuit 357. A _________ is the physical connection between an endpoint and a switch or between two switches. Answer: b. Transmission path 358. On a network that uses NAT, the _______ has a translation table. Answer: a. Router 359. Identify the class of IP address 229.1.2.3. Answer: d. Class D 360. On a network that uses NAT, _______ initiates the communication. Answer: a. An internal host 361. A subnet mask in class B can have _______ 1s with the remaining bits 0s. Answer: b. Seventeen 362. A subnet mask in class C can have _______ 1s with the remaining bits 0s. Answer: a. Twenty-five 363. Identify the class of IP address 4.5.6.7. Answer: a. Class A 364. Identify the class of IP address 191.1.2.3. Answer: b. Class B 365. A subnet mask in class A can have _______ 1s with the remaining bits 0s. Answer: a. Nine

366. Class _______ has the greatest number of hosts per given network address. Answer: a. A 367. A subnet mask in class B has nineteen 1s. How many subnets does it define? Answer: b. 8 368. In _______ routing, the full IP address of a destination is given in the ro uting table. Answer: b. Host-specific 369. A subnet mask in class C has twenty-five 1s. How many subnets does it defin e? Answer: b. 2 370. Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address? Answer: c. 180.25.0.0 371. Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address? Answer: d. 18.240.0.0 372. _______ is a client-server program that provides an IP address, subnet mask , IP address of a router, and IP address of a name server to a computer. Answer: b. DHCP 373. In _______, each packet of a message need not follow the same path from sen der to receiver. Answer: b. The datagram approach to packet switching 374. An IP address consists of _______ bits. Answer: b. 32 375. On a network that uses NAT, the router can use _______ global address(es). Answer: a. A pool of 376. In _______ routing, the mask and destination addresses are both 0.0.0.0 in the routing table. Answer: a. Default 377. A subnet mask in class A has fourteen 1s. How many subnets does it define? Answer: a. 64 378. In which type of switching do all the packets of a message follow the same channels of a path? Answer: a. Virtual circuit packet switching 379. In _______ routing, the destination address is a network address in the rou ting table. Answer: a. Network-specific 380. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address? Answer: a. 201.14.78.64 381. In error reporting the encapsulated ICMP packet goes to _______. Answer: c. The sender 382. When the hop-count field reaches zero and the destination has not been reac hed, a _______ error message is sent. Answer: c. Time-exceeded 383. An ARP request is _______ to _______. Answer: c. Broadcast; all hosts 384. What is the maximum size of the data portion of the IP datagram? Answer: a. 65,515 bytes 385. A best-effort delivery service such as IP does not include _______. Answer: d. All the above 386. An HLEN value of decimal 10 means _______. Answer: b. There is 40 bytes in the header 87. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes? Answer: c. 428 388. If the fragment offset has a value of 100, it means that _______. Answer: a. The first byte of the datagram is byte 800 389. What is needed to determine the number of the last byte of a fragment?

Answer: d. (b) and (c) 390. The IP header size _______. Answer: b. Is 20 to 60 bytes long 391. If a host needs to synchronize its clock with another host, it sends a ____ ___ message. Answer: b. Time-stamp-request 392. Which of the following is a necessary part of the IPv6 datagram? Answer: d. (a) and (c) 393. _______ is a dynamic mapping protocol in which a physical address is found for a given IP address. Answer: c. ARP 394. A router reads the _______ address on a packet to determine the next hop. Answer: c. IP 395. The target hardware address on an Ethernet is _______ in an ARP request. Answer: c. 0x000000000000 396. When not all fragments of a message have been received within the designate d amount of time, a _______ error message is sent. Answer: a. Time-exceeded 397. A ______ can learn about network ______ by sending out a router-solicitatio n packet. Answer: c. Host; routers 398. Which of the following types of ICMP messages needs to be encapsulated into an IP datagram? Answer: d. All the above 399. The purpose of echo request and echo reply is to _______. Answer: c. Check node-to-node communication 400. An ARP reply is _______ to _______. Answer: a. Unicast; one host 401. One method to alert a source host of congestion is the _______ message. Answer: a. Source-quench 402. A time-exceeded message is generated if _______. Answer: d. (b) and (c) 403. To determine whether a node is reachable, _______ message can be sent. Answer: a. An echo-request 404. In IPv6, the _______ field in the base header restricts the lifetime of a d atagram. Answer: b. Hop limit 405. In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000? Answer: a. 39,952 406. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? Answer: b. The identification field is the same for all three datagrams. 407. Errors in the header or option fields of an IP datagram require a ______ er ror message. Answer: b. Parameter-problem 408. The cost field of a router's first table from itself always has a value of _______. Answer: b. 0 409. A routing table contains _______. Answer: d. All the above 410. Router B receives an update from router A that indicates Net1 is two hops a way. The next update from A says Net1 is five hops away. What value is entered i n B's routing table for Net1? Assume the basic RIP is being used. Answer: a. 6 411. If the routing table contains four new entries, how many update messages mu st the router send to its one neighbor router? Answer: c. 1 412. An area border router can be connected to _______. Answer: d. Another router or another network

413. Which of the following usually has the least number of connections to other areas? Answer: b. A stub link 414. _______ is used in a dense multicast environment while _______ is used in a sparse multicast environment. Answer: d. PIM-DM; PIM-SM 15. When a multicast router is not directly connected to another multicast route r, a _______ can be formed to connect the two. Answer: d. Logical tunnel 416. Which type of network using the OSPF protocol can have five routers attache d to it? Answer: a. Transient 417. A WAN using the OSPF protocol that connects two routers is an example of a _______ type of OSPF network. Answer: b. Point-to-point 418. If four hosts on a network belong to the same group, a total of _______ sen t in Answer: b. Two membership reports are 419. A one-to-all communication between a source and all hosts on a network is c lassified as a _______ communication. Answer: c. Broadcast 420. Which type of BGP message announces a route to a new destination? Answer: a. Update 421. Which layer produces the OSPF message? Answer: d. Network 422. Which of the following is an exterior routing protocol? Answer: c. BGP 423. An area is _______. Answer: c. Part of an AS 424. In an autonomous system with n areas, how many areas are connected to the b ackbone? 1 Answer: c. n 425. Which of the following is an interior routing protocol? Answer: d. (a) and (b) 426. OSPF is based on _______. Answer: c. Link state routing 427. BGP is based on _______. Answer: c. Path vector routing 428. Which type of BGP message creates a relationship between two routers? Answer: b. Open 429. Which type of network using the OSPF protocol always consists of just two c onnected routers? Answer: c. Point-to-point 430. Which type of network using the OSPF protocol is the result of a break in a link between two routers? Answer: a. Virtual 431. Which type of BGP message is sent by a router to close a connection? Answer: c. Notification 432. An IGMP query is sent from a _______ to a _______. Answer: a. Router; host or router 433. Which type of BGP message is sent by a system to notify another router of t he sender's existence? Answer: a. Keep-alive 434. An Ethernet LAN using the OSPF protocol with five attached routers can be c alled a _______ network. Answer: c. Transient 435. In distance vector routing each router receives information directly from _ ______. Answer: a. Its neighbors only 436. A system uses group-shared trees for multicasting. If there are 100 sources

and 5 groups, there is a maximum of _______ different trees. Answer: c. 5 437. _______ is a multicast routing protocol using source-based trees. Answer: d. (a) and (b) 438. Pruning and grafting are strategies used in _______. Answer: a. RPM 439. In distance vector routing a router sends out information _______. Answer: c. At regularly scheduled intervals 440. The _______ field of the IGMP message is all zeros in a query message. Answer: c. Group address 441. The _______ field of the IGMP message is 0x11 for a query message. Answer: d. d. (a) and (b) 442. A one-to-many communication between a source and a specific group of hosts is classified as a _______ communication. Answer: a. Multicast 443. A one-to-one communication between a source and one destination is classifi ed as a _______ communication. Answer: a. Unicast 444. ________ is a multicasting application. Answer: d. All the above 445. A _______ is a data structure with nodes and edges and a hierarchical struc ture. Answer: c. Tree 446. A system uses source-based trees for multicasting. If there are 100 sources and 5 groups, there is a maximum of _______ different trees. Answer: d. 500 447. In a _______ tree approach to multicasting, the combination of source and g roup determines the tree. Answer: b. Source-based 448. In a _______ tree approach to multicasting, the group determines the tree. Answer: a. Group-shared 449. _______ is a multicast routing protocol using group-shared trees. Answer: c. CBT 450. In _______ a network can receive a multicast packet from a particular sourc e only through a designated parent router. Answer: c. RPB 451. Dijkstra's algorithm is used to _______. Answer: d. Calculate the routing tables 452. A _______ message tells an upstream router to stop sending multicast messag es for a specific group through a specific router. Answer: Prune 53. The _______ is used by a router in response to a received-leave report. Answer: a. Special query message 454. RIP is based on _______. Answer: d. Distance vector routing 455. A _______ message tells an upstream router to start sending multicast messa ges for a specific group through a specific router. Answer: d. Graft 456. _______ uses multicast link state routing concepts to create source-based t rees. Answer: d. MOSPF 457. In the _______ protocol, a multicast packet is encapsulated inside a unicas t packet with the core router as the destination. Answer: b. CBT 458. The _______ is an IGMP message. Answer: d. All the above 459. The _______ defines the client program. Answer: b. Ephemeral port number 460. The _______ timer is used in the termination phase. Answer: b. Time-waited

461. Which is a legal port address? Answer: d. All the above 462. The definition of reliable delivery includes _______. Answer: d. All the above 463. Which of the following does UDP guarantee? Answer: d. None of the above 464. The source port address on the UDP user datagram header defines _______. Answer: d. The application program on the sending computer 65. A host can be identified by _______ while a program running on the host can be identified by _______. Answer: b. An IP address; a port number 466. Which of the following is not part of the UDP user datagram header? Answer: c. Length of header 467. The _______ defines the server program. Answer: b. Well-known port number 468. IP is responsible for _______ communication while TCP is responsible for __ _____ communication. Answer: b. Host-to-host; process-to-process 469. The _______ timer is needed to handle the zero window-size advertisement. Answer: a. Persistence 470. Connection establishment involves a _______ handshake. Answer: a. Three-way 471. A special segment called a probe is sent by a sending TCP when the _______ timer goes off. Answer: a. Persistence 472. The _______ address uniquely identifies a running application program. Answer: c. Socket 473. The _______ field is used to order packets of a message. Answer: a. Sequence number 474. The _______ field is used for error detection. Answer: d. Checksum 475. Multiply the header length field by _______ to find the total number of byt es in the TCP header. Answer: a. 4 476. Urgent data require the urgent pointer field as well as the URG bit in the ______ field. Answer: b. Control 477. In ______, data are sent or processed at a very inefficient rate, such as 1 byte at a time. Answer: a. Silly window syndrome 478. The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: b. Retransmission 479. To prevent silly window syndrome created by a receiver that processes data at a very slow rate, _______ can be used. Answer: d. (a) or (c) 480. To prevent silly window syndrome created by a sender that sends data at a v ery slow rate, _______ can be used. Answer: a. Nagle's algorithm 481. An ACK number of 1000 always means that _______. Answer: d. None of the above 482. The _______ timer prevents a long idle connection between two TCPs. Answer: a. Keep-alive 483. UDP and TCP are both _______ layer protocols. Answer: d. Transport 484. Which of the following functions does UDP perform? Answer: b. Process-to-process communication 485. UDP needs the _______ address to deliver the user datagram to the correct a pplication program. Answer: d. Port

486. Karn's algorithm is used in calculations by the _______ timer. Answer: b. Retransmission 487. Slow start is used in conjunction with _______ as a TCP congestion control strategy. Answer: c. Additive increase 488. The maximum length of time that traffic is generated at the peak rate is ca lled the _______. Answer: c. Maximum burst size 489. For a system using TCP, the sender window size is determined by the _______ window size. Answer: d. (a) and (c) 490. _______ traffic features sudden data rate changes in very short periods of time. Answer: b. Bursty 491. When the load is greater than the capacity, the delay _______. Answer: b. Goes to infinity 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 492. _______ is a closed-loop mechanism to alleviate congestion. Answer: d. All the above 493. The FECN informs the _________ of congestion while the BECN informs the ___ ____ of congestion. Answer: d. Destination; sender 494. The _______ is the maximum data rate of the traffic. Answer: d. Peak data rate 495. _______ is a flow characteristic in which the delay varies for packets belo nging to the same flow. Answer: b. Additive increase 496. In _______ queuing the first packet into the queue is the first packet out of the queue. Answer: c. FIFO 497. In Frame Relay the transmission rate can never exceed _______. Answer: b. The access rate 498. _______ measures the variation in cell transmission time. Answer: b. CVDT

499. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent per second? Answer: c. 55,000 500. The _______ traffic shaping method gives a host credit for its idle time. Answer: c. Token bucket 501. A flow-based QoS model designed for IP is called _______. Answer: b. Integrated Services 502. A signaling protocol that helps IP create a flow is called _______. Answer: a. RSVP 503. RSVP uses _______ messages. Answer: . Path Resv

504. In an RSVP reservation style called _______ filter, the router creates a si ngle reservation that can be shared by a set of flows. Answer: b. Shared explicit 505. Differentiated Services was designed to handle the _______ problem associat ed with Integrated Services. Answer: c. Scalability 506. A _______ is a Differentiated Services traffic conditioner. Answer: c. Shaper 507. What is the relationship between the access rate and the CIR? Answer: d. CIR is less than the access rate. 508. If the maximum CTD is 10 s and the minimum CTD is 1 s, the _______ is 9 s. Answer: a. CDV 509. A Frame Relay network is committed to transfer _______ bps without discardi ng any frames. Answer: b. Bc 510. The effective bandwidth is based on _______. Answer: d. All the above 511. The cell _______ is the difference between the CTD maximum and minimum. Answer: a. Delay variation 512. The cell _______ is the ratio of lost cells to cells sent. Answer: c. Loss ratio

513. The _______ service class is particularly suitable for applications with bu rsty data. Answer: b. ABR 514. The _________ service class is suitable for customers who need real-time vi deo transmission without compression. Answer: b. CBR 515. The _______ is greater than the SCR. Answer: c. PCR 516. The _______ is the fraction of the cells delivered in error. Answer: b. CER 517. When added to Be, Bc should be less than the _______. Answer: c. Access rate 518. A connectionless iterative server uses _______ ports. Answer: a. Well-known 519. The _______ socket is used with a protocol that directly uses the services of IP. Answer: . Raw 520. A _______ server serves multiple clients, handling one request at a time. Answer: a. Connectionless iterative 521. A client issues _______ when it needs service from a server. Answer: c. An active open 522. A _______ server serves multiple clients simultaneously. Answer: d. Connection-oriented concurrent 523. The server program is _______ because it is always available, waiting for a client request. Answer: b. Infinite 524. A connection-oriented concurrent server uses _______ ports. Answer: a. Well-known Ephemeral 525. Machine A requests service X from machine B. Machine B requests service Y f rom machine A. What is the total number of application programs required? Answer: d. Four 526. A server program, once it issues _______, waits for clients to request its service. Answer: d. A passive open

527. _______ can request a service. Answer: b. A client 528. _______ can provide a service. Answer: a. An iterative server A concurrent server 529. The client program is _______ because it terminates after it has been serve d. Answer: a. Finite 530. _______ processes requests one at a time. Answer: a. An iterative server 531. The _______ socket is used with a connectionless protocol. Answer: c. Datagram 532. _______ processes many requests simultaneously. Answer: d. A concurrent server 533. In a connection-oriented concurrent server, the _______ is used for connect ion only. Answer: a. Well-known port 534. A _______ is an instance of a _______. Answer: b. Process; program 535. The _______ socket is used with a connection-oriented protocol. Answer: b. Stream 536. In the string 219.46.123.107.in-addr.arpa, what is the network address of t he host we are looking for? Answer: b. 107.0.0.0 537. In _______ resolution the client is in direct contact with at most one serv er. Answer: b. A recursive 538. In address-to-name resolution the _______ domain is used. Answer: d. Inverse 539. How is the lifetime of a name-to-address resolution in cache memory control led? Answer: b. By the time-to-live counter set by the server By the time-to-live fie ld set by the authoritative server 540. A DNS response is classified as ______ if the information comes from a cach e memory. Answer: c. Unauthoritative

541. A host with the domain name pit.arc.nasa.gov. is on the _______ level of th e DNS hierarchical tree. (The root is level 1.) Answer: b. Fifth 542. A DNS _______ server's zone is the entire DNS tree. Answer: b. Root 543. To find the IP address of a host when the domain name is known, the _______ can be used. Answer: a. Inverse domain 544. A DNS _______ server gets its data from another DNS server. Answer: c. Secondary 545. A DNS _______ server creates, maintains, and updates the zone file. Answer: b. Primary 546. A host with the domain name trinity.blue.vers.inc is on the _______ level o f the DNS hierarchical tree. (The root is level 1.) Answer: d. Not enough information given 547. In the domain name chal.atc.fhda.edu, _______ is the least specific label. Answer: b. edu 548. In the domain name chal.atc.fhda.edu, _______ is the most specific label. Answer: b. chal 549. In _______ resolution the client could directly contact more than one serve r. Answer: a. An iterative 550. Which of the following domain names would most likely use a country domain to resolve its IP address? Answer: b. kenz.acct.sony.jp 551. A resolver is the _______. Answer: b. DNS client 552. Which of the following is true? Answer: d. All the above are true. 553. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The text must precede the image. What is the content-type? Answer: d. Multipart/mixed 554. During an FTP session the control connection is opened _______. Answer: b. Exactly once

555. The purpose of the MTA is _______. Answer: a. Transferral of messages across the Internet 556. In anonymous FTP, the user can usually _______. Answer: b. Retrieve files 557. Which part of the mail created by the UA contains the sender and receiver n ames? Answer: a. Header 558. In the email address Only the registered members can see the link. Register here, what is the domain name? Answer: c. pit.arc.nasa.gov 559. The _______ field in the MIME header uses text to describe the data in the body of the message. Answer: b. Content-Id 560. The _______ field in the MIME header describes the method used to encode th e data. Answer: d. Content-transfer-encoding 561. The _______ field in the MIME header has type and subtype subfields. Answer: b. Content-type 562. A JPEG image is sent as email. What is the content-type? Answer: d. Image/JPEG 563. The purpose of the UA is _______. Answer: a. Message preparation Envelope creation

564. The _______ field in the MIME header is the type of data and the body of th e message. Answer: c. Content-type 565. A message is fragmented into three email messages. What is the content-type ? Answer: a. Message/partial 566. A client machine usually needs _______ to send email. Answer: c. Only SMTP 567. In FTP, what attributes must be defined by the client prior to transmission ? Answer: d. All the above

568. In FTP, there are three types of _______: stream, block, and compressed. Answer: b. Transmission modes 569. In FTP, ASCII, EBCDIC, and image define an attribute called _______. Answer: c. File type 570. In FTP, when you _______, it is copied from the server to the client. Answer: a. Retrieve a file Retrieve a list

571. In FTP, when you _______, it is copied from the client to the server. Answer: b. Store a file 572. An email contains a textual birthday greeting, a picture of a cake, and a s ong. The order is not important. What is the content-type? Answer: d. Multipart/parallel 573. During an FTP session the data connection is opened _______. Answer: c. As many times as necessary 574. Which of the following is a retrieval method? Answer: d. All the above 575. A request message always contains _______. Answer: d. A request line and a header 576. Which of the following is present in both a request line and a status line? Answer: c. HTTP version number 577. Which of the following is not a client program in WWW? Answer: c. HTML 578. A user wants to replace a document with a newer version; the request line c ontains the _______ method. Answer: a. PUT 579. The _______ header can specify the client configuration and the client's pr eferred document format. Answer: a. Request 580. The _______ tags enclose binary code or byte code. Answer: a. Executable contents 581. Which type of Web document is run at the client site? Answer: b. Active 582. HTTP has similarities to both _______ and _______. Answer: d. FTP; SMTP

583. A user needs to send the server some information. The request line method i s ______. Answer: b. POST 584. A response message always contains _______. Answer: c. A request line and a header 585. The _______ header supplies information about the body of a document. Answer: c. Entity 586. The _______ header can specify the server configuration or provide informat ion about a request. Answer: c. Response 587. Hypertext documents are linked through _______. Answer: b. Pointers 588. Which of the following is an interpreter? Answer: d. HTML 589. What are the components of a browser? Answer: a. Controller, client program, interpreter 590. A user needs to retrieve a document from the server; the request line conta ins the _______ method. Answer: a. GET The correct answer is a 591. Which type of Web document is fixed-content and is created and stored at th e server site? Answer: c. Static 592. The _______ of a Web page contains the title and parameters used by the bro wser. Answer: c. Head 593. Which type of Web document is created at the server site only when requeste d by a client? Answer: c. Dynamic 594. In &lt; IMG SRC="Pictures/book1.gif" ALIGN=middle&gt; ALIGN is _______. Answer: d. An attribute 595. A user wants to copy a file to another location; the request line contains the _______ method. Answer: c. COPY 596. What does the URL need to access a document? Answer: d. All the above

597. Which type of Web document is transported from the server to the client in binary form? Answer: a. Active 598. An ending tag is usually of the form _______ Answer: c. </tagname> 599. An applet is a small application program written in _______ Answer: b. Java 600. Stock quotations are posted on the Web. This is probably a(n) _______ docum ent. Answer: b. Dynamic 601. Updates for a satellite's coordinates can be obtained on the WWW. This is p robably a(n) _______ document. Answer: b. Dynamic 602. A user needs to move a file to another location. The request line method is _______. Answer: b. MOVE 603. Which category of HTML tags allows the listing of documents? Answer: c. List 604. A program can use _______ to write a CGI program. Answer: d. Any of the above 605. An unemployed actor has posted his resume on the Web. This is probably a(n) _______ document. Answer: d. Static 606. The server receives input from a browser through _______. Answer: b. A form 607. Output from a CGI program is _______. Answer: d. Any of the above 608. _______ is used to enable the use of active documents. Answer: c. HTML 609. Java is _______. Answer: d. All the above 610. An applet is _______ document application program. Answer: a. An active 611. In a real-time video conference, data from the server are _______ to the cl

ient sites. Answer: c. Multicast 612. A _______ adds signals from different sources to create a single signal. Answer: a. Mixer 613. The RTCP _______ message shuts down a stream. Answer: c. Bye 614. A standard that allows a telephone (connected to a public telephone network ) to talk to a computer connected to the Internet is _______. Answer: b. H.323 615. A _______ changes the format of a high-bandwidth video signal to a lower-qu ality narrow-bandwidth signal. Answer: d. Translator 616. An RTP packet is encapsulated in a(n) _______. Answer: c. UDP user datagram 617. The last step in JPEG, _______, removes redundancies. Answer: b. Compression 618. A _______ shows when a packet was produced relative to the first or previou s packet. Answer: c. Timestamp 619. _______ is a protocol to set up and terminate a connection between a comput er on the Internet and a telephone (connected to a public telephone network). Answer: d. Q.931 620. TCP is not suitable for real-time traffic because _______. Answer: d. All the above 621. JPEG encoding involves _______, a process that reveals the redundancies in a block. Answer: d. The DCT 622. The RTCP _______ report informs the sender and other receivers about the qu ality of service. Answer: c. Receiver 623. _______ is an application layer protocol that establishes, maintains, and t erminates a multimedia session. Answer: b. SIP 624. For streaming stored audio/video, the _______ holds information about the a udio video file.

Answer: d. Metafile 625. _______ is a control protocol that adds functionalities to the streaming pr ocess. Answer: b. RTSP 626. The audio/video stream is sent by the media server to the _______. Answer: a. Media player 627. Voice over IP is a(n) ________ audio/video application. Answer: a. Interactive 628. _______ is a SIP message type. Answer: d. All the above 629. A _______ is involved in an SIP mechanism to find the IP address of a calle e. Answer: a. Proxy server Registrar server 630. _______ are used to number the packets of a real-time transmission. Answer: d. Sequence numbers 631. In the _______ the encryption of each 8-byte block is independent of the ot hers. Answer: c. ECB mode 632. In the public-key method of cryptography, which key is publicly known? Answer: a. Encryption key only 633. A cipher is _______. Answer: a. An encryption algorithm A decryption algorithm 634. Before a message is encrypted, it is called _______. Answer: d. Plaintext 635. If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. Answer: a. 190 636. The _______ is an example of polyalphabetic substitution. Answer: b. Vigenere cipher 637. In the symmetric-key method of cryptography, which key is publicly known? Answer: d. None of the above 638. The RSA algorithm uses a _______ cryptography method. Answer: d. Public-key

639. The _______ is a block cipher. Answer: d. All the above 640. We use an cryptography method in which the plaintext AAAAAA becomes the cip hertext BCDEFG. This is probably _______. Answer: c. Polyalphabetic substitution 641. One way to encrypt and decrypt long messages is through the use of the ____ ___. Answer: d. All the above 642. An initialization vector is needed in the _______. Answer: a. CSM CBC mode 643. In the public-key method of cryptography, only the receiver has possession of the _______. Answer: c. Private key 644. After a message is decrypted, it is called _______. Answer: d. Plaintext 645. We use a cryptography method in which the character Z always substitutes fo r the character G. This is probably _______. Answer: c. Monoalphabetic substitution 646. A protocol called _______ describes the certificate issued by a CA in a str uctural way. Answer: b. X.509 647. Windows 2000 uses an authentication protocol called _______. Answer: b. Kerberos 648. In the digital signature technique, the sender of the message uses _______ to create ciphertext. Answer: b. His or her own private key 649. A _______ is a trusted third party that solves the problem of symmetric-key distribution. Answer: d. KDC 650. In a _______ attack, a message captured by an intruder is illegally sent a second time. Answer: b. Replay 651. In the _______ protocol, a nonce is decremented by 1 so that an intruder ca nnot send the exact same message a second time. Answer: a. Needham-Schroeder

Answer: 652. If user A wants to send an encrypted message to user B, the plainte xt is encrypted with the public key of _______. c. User B Answer: 653. When symmetric-key encryption is combined with private-key encrypti on, the _______ key is encrypted with the public key. Answer: d. Symmetric 654. The _______ issues tickets for the real server. Answer: c. AS 655. In _______-key cryptography, everyone has access to all the public keys. Answer: c. Symmetric 656. In the digital signature technique, the receiver of the message uses ______ _ to create plaintext. Answer: a. The sender's public key 657. A _______ is a large number used only once that helps distinguish a fresh a uthentication request from a repeated one. Answer: c. Nonce 658. A _______ certifies the binding between a public key and its owner. Answer: c. CA 659. In an authentication using symmetric keys, if 10 people need to communicate , we need _______ keys. Answer: d. 45 660. In the _______ protocol, the symmetric key is K = G<sup>xy</sup> mod N, whe re G and N are public numbers. Answer: c. Diffie-Hellman 661. In a _______ attack, an intruder comes between two communicating parties in tercepting and replying to their messages. Answer: d. Man-in-the-middle 662. A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate. Answer: c. KDC 663. _______ is an authentication protocol that needs an authentication server a nd a ticket-granting server. Answer: d. Kerberos 664. The _______ is the KDC in the Kerberos protocol. Answer: c. AS

665. The _______ field in the authentication header and the ESP header define th e security method used in creating the authentication data. Answer: b. SPI 666. Tunneling is a technique in which the IP datagram is first _______ and then _______. Answer: b. Encrypted; encapsulated in another datagram 667. _______ is an IP layer security protocol that only provides integrity and a uthentication. Answer: d. AH 668. An _______ is a private network with no external access that uses the TCP/I P suite. Answer: b. Intranet 669. IPSec requires a logical connection between two hosts using a signaling pro tocol called _______. Answer: d. SA 670. An _______ is a private network with limited external access that uses the TCP/IP suite. Answer: b. Extranet 671. The handshake protocol and data exchange protocol are part of _______. Answer: a. TLS 672. _______ is a collection of protocols that provide security at the IP layer level. Answer: c. IPSec 673. A method to provide for the secure transport of email is called _______. Answer: b. PGP 674. A VPN uses _______ to guarantee privacy. Answer: a. IPSec b. Tunneling

675. A _______ can forward or block messages based on the information in the mes sage itself. Answer: b. Proxy firewall 676. _______ is an IP layer security protocol that provides privacy as well as i ntegrity and authentication. Answer: d. ESP 677. _______ is a transport layer security protocol. Answer: c. TLS

678. An IP datagram carries an authentication header if the _______ field of the IP header has a value of 51. Answer: a. Protocol 679. A _______ network is totally isolated from the global Internet. Answer: a. Private 680. A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. Answer: b. Hybrid 681. In a VPN, _______ encrypted. Answer: d. Both inner and outer datagrams are 682. A _______ can forward or block packets based on the information in the netw ork layer and transport layer headers. Answer: c. Packet-filter firewall 1. A packet whose destination is outside the local TCP/IP network segment is sen t to the Answer: Default gateway 2. Why was the OSI model developed? Answer: standards were needed to allow any two systems to communicate 3. Which piece of information is not vital for a computer in a TCP/IP network? Answer: DNS server 4. The physical layer is concerned with the movement of _______ over the physica l medium. Answer: bits 5. Which protocol below operates at the network layer in the OSI model? Answer: All of the above 6. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. Answer: removed 7. Session layer of the OSI model provides Answer: Dialog control 8. IPv6 has _______ -bit addresses. Answer: 128 9. Which one of the following functionalities isn\'t provided by TCP? Answer: Flow control Addressing Retransmission of packets as required Pr oper sequencing of the packets 10. Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B 11. An IP address contains________ bits ? Answer: 32 12. Which routing protocol below is used by exterior routers between the autonom ous systems? Answer: BGP 13. Which of the IP headers decides when the packet should be discarded? Answer: TTL 14. Which IP address is reserved for software loop-back? Answer: 127.x.x.x 15. What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 16. Which port is reserved for use of the SMTP protocol? Answer: 25 17. Which one of the folowings is a connectionless protocol?

Answer: All of the above 18. Which application below uses the UDP protocol? Answer: All of the above 19. Howmany IP addresses can be assigned to hosts in a C-class network segment w ith a subnet mask of 255.255.255.192? Answer: 62 20. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks? Answer: Assignment of more IP addresses 1. The maximum number of nodes per segment depends on the_______.? Answer: Attenuation 2. Information can be transmitted via one of_______siganlling method(s). Answer: Two 3. IEEE designates Thicknet as_______Ethernet Answer: 10Base5 4. ensure(s) that data are transferred whole, in sequence, and without error fro m one node on the network to another. Answer: Protocol 5. Which is not an exmple of transmission media? Answer: None of the above 6. Mail services requires a significant commitment of technical support and admi nistration and resources due to their Answer: Heavy use 7. How many layers in the OSI model? Answer: 7 8. Which device act as a traffic cop? Answer: Router 9. What is SMTP? Answer: Simple mail transport protocol 10. An organization that share devices, saves Answer: All of the above. 11. The computer you are controlling or working via a network. Answer: remote computer 12. A network of computers and other devices that is confined to a relatively sm all space. Answer: Peer-to-Peer network 13. What layer of OSI does the encryption/decryption? Answer: Presentaion layer 14. E-mail use communication protocol. Answer: SMTP 15. What is the default port number for SMTP? Answer: 25 16. What is the default port number for FTP? Answer: 21 17. What is the default port number for Web server such as IIS and Apache? Answer: 80 18. HTTP is the protocol use to view web pages. Answer: True 19. Which cannot support full-duplexing? Answer: 100BaseT4 20. Vertical connectors between floors are known as_______. Answer: Riser The _______ defines the client program. Answer: Ephemeral port number 2 INCORRECT The _______ timer is used in the termination phase. Answer: B) Time-waited

3 INCORRECT Answer: 4 INCORRECT Answer: 5 INCORRECT Answer: 6 INCORRECT _______. Answer: 7 INCORRECT the host can be Answer: der?

Which is a legal port address? D) All the above The definition of reliable delivery includes _______. D) All the above Which of the following does UDP guarantee? D) None of the above The source port address on the UDP user datagram header defines D) The application program on the sending computer A host can be identified by _______ while a program running on identified by _______. B) An IP address; a port number

8 INCORRECT Which of the following is not part of the UDP user datagram hea Answer: C) Length of header

9 INCORRECT The _______ defines the server program. Answer: B) Well-known port number 10 INCORRECT IP is responsible for _______ communication while TCP is respo nsible for _______ communication. Answer: B) Host-to-host; process-to-process 11 CORRECT The _______ timer is needed to handle the zero window-size adver tisement. Answer: A) Persistence 12 CORRECT Connection establishment involves a _______ handshake. Answer: A) Three-way 13 CORRECT A special segment called a probe is sent by a sending TCP when t he _______ timer goes off. Answer: A) Persistence 14 INCORRECT The _______ address uniquely identifies a running application program. Answer: C) Socket 15 INCORRECT The _______ field is used to order packets of a message. Answer: A) Sequence number 16 INCORRECT The _______ field is used for error detection. Answer: D) Checksum 17 CORRECT Multiply the header length field by _______ to find the total nu mber of bytes in the TCP header. Answer: A) 4 18 INCORRECT Urgent data require the urgent pointer field as well as the UR G bit in the ______ field. B) Control 19 CORRECT In ______, data are sent or processed at a very inefficient rate , such as 1 byte at a time. Answer: A) Silly window syndrome 20 INCORRECT The _______ timer keeps track of the time between the sending of a segment and the receipt of an acknowledgment. Answer: B) Retransmission

21 INCORRECT To prevent silly window syndrome created by a receiver that pr ocesses data at a very slow rate, _______ can be used. Answer: D) (a) or (c) 22 CORRECT To prevent silly window syndrome created by a sender that sends data at a very slow rate, _______ can be used. Answer: C) Delayed acknowledgment

1. Which piece of software allows the computer s operating system to access the NI C hardware? Answer: A. NIC driver 2. Which component of a NIC can store the settings like IRQ, I/O address, and DMA a ddress? Answer: D. EEPROM 3. Which cable type s primary use is 100BaseT networks? Answer: A. UTP

5. If you were going to make a 10BaseT patch cable, which tool would you use? Answer: C. Wire crimper 6. SCSI connections can use which of the following connectors? (Choose all that app ly.) Answer: B. DB-25 Answer: C. Centronics-50 7. Depending on the Windows client operating system version, which command can you use to find out what is installed on a system? Answer: B. MSD 8. Which network connectivity device is specifically designed to extend the maximum reach of a network segment? Answer: C. Repeater 9. Answer: A bridge can increase network efficiency by _____________________. B. Learning and storing the MAC address for each NIC on each side of the br idge and then, based on this information, forwarding packets only to the appropr iate segment 10. What is the result of updating an old NIC driver on a system? Answer: A. It can correct bugs. 11. EEPROM is short for ________________________________________. Answer: B. Electrically erasable programmable read-only memory

12. Plug and Play expansion cards sometimes have problems working correctly with ___ ________________ expansion cards. Answer: C. Legacy ISA 13. A brouter combines which functions? (Choose all that apply.) Answer: A. Router 14. The 10Base2 implementation of Ethernet, for the most part, uses which type of co nnector? Answer: B. BNC 15. You are a consultant. You have been asked to find out where a particular mystery jack originates and what path the cable takes to get there. Which network install ation tool would you most likely use? Answer: D. Tone generator/tone locator 16. You are installing an Ethernet network and have two workstations located 150 met ers apart. You are on an extremely limited budget. Which type of network cable w ould be the best choice to run between the two workstations? Answer: C. Coax 17. Which network component shares out a printer so that printing services can be prov ided to the entire network? Answer: A. Print server 18. Which of the following power conditions occurs when the voltage level increases quickly and falls just as quickly? Answer: B. Spike 19. Which power condition occurs when the voltage level increases quickly and remain s at the high level for an extended period of time (several seconds)? Answer: A. Surge 20. Answer: Which power condition occurs when the voltage level drops below 120 volt s and stays below for an extended period of time? C. Brownout 1. Which of the following are characteristic of a peer-to-peer network? (Ch oose all that apply.) Answer: B. A computer can be both a client and a server. 2. The best cable choice for linking a few computers in a small office usin g a bus Ethernet network is cable with an ___________________ designation.

Answer: B.

RG-58

3. Which of the following are characteristic of a true client/server enviro nment? (Choose all that apply.) Answer: C. It has centralized security and administration. 4. A network that uses 10Base2 requires ___________________ terminators for each network segment in order to function correctly. Answer: C. 2 5. Which of the following is characteristic of a mesh network? Answer: B. It offers improved reliability. 6. Which type of network topology uses terminators? Answer: B. Bus 7. Which of the following best describes a star topology? Answer: A. It has centralized management. 8. A client/server approach uses what type of security model? Answer: A. Centralized 9. In a Thick Ethernet network, what typically connects the NIC s transceiver to the backbone cable? Answer: C. Vampire Taps 10. Plenum cable has which of the following characteristics? Answer: B. It meets fire codes. 11. Which of the following is the most widely used LAN wiring system for con nections between desktop and server? Answer: B. UTP 12. Which of the following has the highest possible throughput? Answer: D. Fiber-optic 13. Which 100-Megabit Ethernet standard is designed to use two pairs of wire s in a UTP cable? Answer: D. 100BaseTX 14. A transmission technology that divides that transmission medium into dis crete channels so that multiple signals can share the same cable is known as ___ ________________. Answer: D. Broadband communications 15. What is the primary advantage to network attached storage (NAS) devices over a traditional server? Answer: B. NAS devices are less expensive. 16. used on Answer: 17. Answer: An RJ-45 connector should be wired with ____________________ pairs when a Category 5 UTP cable. C. 4 Thicknet can be extended to ___________________ meters per segment. C. 500

18. Which network component is used in conjunction with a router to provide access to a T1 circuit? Answer: C. CSU/DSU 19. Failure to terminate a bus topology properly will result in _________. Answer: B. Unwanted signal echo 20. What device must you install in a computer to provide it with a physical , an electrical, and an electronic connection to a network?

Answer: B.

NIC

In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: *D. Attackers make network resources unavailable by overwhelming resource with bogus traffic What is the throughput of a link in a network? Answer: *C. Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____Datagram network //Answer: *C. Virtual-circuit network Answer: *E. Datagram network Which statement is correct for layering in OSI model Answer: *E. Layering allows easy and maintain and updating the system; c hanging the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: * C. TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: *E. Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: *A. Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: *C. L/R Which one is correct about P2P network? Answer: *C. A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: *E. TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: *E. TCP A WeAnswer: b page (also called a document) consists of _______ such as a HTML f ile, a JPEG image, a GIF image, a Java applet, an audio clip, etc. *A. Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: *A. The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: *E. All of the other SMTP stands for Answer: *A. Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 IMAP and POP are_________ Answer: *A. Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: *E. MIME TCP provides __________between application processes running on different hosts Answer: *A. Logical communications What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ

ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: *A. Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: *C. 136 Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not What flag is used to close TCP connection? Answer: *A. FIN The difference between flow control and congestion control is primarily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel TCP is a ___________ protocol. Answer: *A. Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: *A. First What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: *A. Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: *A. 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: *A. All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: *A. 2 Traceroute command uses Answer: *A. ICMP RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm Routers operate in the _______ layers. Answer: *A. network Dijkstra s algorithm is Answer: *A. A link-state routing algorithm Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: *D. 0000 ______ is (are) (an) example(s) of random access MAC Answer: *A. All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: *B. the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN What is store-and-forward operation in switches?

Answer: *A. They receive the whole frame before forwarding to next stati on ______is used in Ethernet Answer: *A. CSMA/CD Which one is the flag used for framing in PPP Answer: *B. 01111110 Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 ARP stands for _________ Answer: *A. Address Resolution Protocol Parity checking _____. Answer: *A. can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are

2. What type of routing algorithm that OSPF use? Answer: a. Shortest Path Routing

11.Which command is used to tell the router to boot from a network server? answer: Router(config)# boot system tftp IOS_filename ip address 12.Which configuration register is used on a Cisco 2500 series router during pas sword recovery? answer: 0x2142 13.You are upgrading the IOS on a router, which command would be used to copy th e new IOS image from a network server? answer: Router# copy tftp flash 14.Which of the following correctly describes a method for specifying how a rout er loads the Cisco IOS software? answer: Designate fallback sources for the router to use in sequence from NVRAM. 15.Which of the following is NOT part of the Cisco IOS naming convention? answer: Amount of space the file will use when copied to NVRAM 16.Which step should be performed before copying software between the TFTP host and Flash memory? answer: Verify that there is sufficient room in Flash to accommodate the IOS 17.In the Cisco IOS name cpa25-cg-1, what does cpa25 represent? answer: Platform on which the image runs 18.Where does the router search for the IOS software if the Flash is empty? answer: TFTP server 19.Which of the following is provided by the show version command? answer: Information about the system image file 20.Which command is used to discover the configuration register setting? answer: show version 21.Which command is used to configure a routing protocol? answer: Router(config)# router rip 22.Which configuration register mode is used to tell the router to boot from NVR AM? answer: 0x---2 23.Which command can be used to check the boot field setting? answer: Router# show version 24.Which configuration register mode is used to tell the router to boot from ROM monitor mode? answer: 0x---0 25.Which command is used to view the name of the system image file? answer: Router# show flash

26.Which of the following best describes the TCP/IP protocol stack? answer: Enables communication among any set of interconnected networks. What is the purpose of ICMPs? answer: They are messages carried in IP datagrams used to send error and control messages. If a router has a serial interface S0, with IP address 107.85.20.2, using a subn et mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet? answer: 107.85.20.15 What will the source do if it is using a window size that is too large for the d estination to handle and does not receive an acknowledgement from the destinatio n? answer: Resend the data If you want to turn off the name-to-address translation in the router, which com mand would you use? answer: no ip domain-lookup If you want to specify one or more hosts that supply host name information, whic h command would you use? answer: ip name-server In the output of show hosts , what does perm mean? answer: The entry was manually configured in a static host table. What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which protocol is found in the Transport Layer? answer: UDP What is the purpose of the protocol field? answer: Determines the Layer 4 protocol being carried within an IP datagram What does the response * mean, when it comes in response to the trace command answer: Timed out waiting for trace reply. If you want to associate a name with an IP address, such as asu 129.219.2.1, wha t command structure would you use? answer: ip host asu 129.219.2.1 What best describes the function of broadcast addresses? answer: Used to send a message to all nodes on a network/subnet. Which command locates path failures from the source to destination? answer: Trace What is the function of ARP? answer: It is used to map a known IP address to an unknown MAC address. If a device on a network does not know its Layer 3 address how can it find it? answer: RARP If Host A is setting up a three-way handshake with Host B, and Host A sends a se gment with sequence number n to Host B, what is Host B going to send back to Hos t A as an acknowledgment? answer: n + 1 Which of the following best describes TCP/IP? answer: Allows communication among a variety of interconnected networks and can be used in both LANs and WANs What is one way port numbers are used? answer: To keep track of different conversations crossing the network at the sam e time. What is the purpose of ICMP testing? answer: Determines if messages reach their destination Which layer in the TCP/IP model includes file transfer, e-mail, remote login, an d network management? answer: Application How does the Cisco IOS software deal with name-to-address mappings? answer: It maintains a cache of host name-to-address mappings for use by command s.

A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 At which Layer of the OSI model would flow control problems exist? answer: Transport How are IP addresses usually expressed? answer: 32-bit dotted decimal Which kind of route is set when the next hop is not explicitly listed in the rou ting table? answer: Default How can the count to infinity problem be prevented? answer: By using hold-down timers Information regarding routes has been received on a router through interface A. Which routing technique will prevent this information from exiting on the router through the same interface A? answer: Split horizon How are link-state routing updates triggered? answer: By topology changes What is one disadvantage of dynamic routing? answer: Requires lots of active network administrator management Which protocol is a link-state routing protocol? answer: OSPF Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork Which term describes the situation where packets never reach their destination b ut instead cycle repeatedly through the same group of network nodes? answer: Routing loop Which routers exchange information when using a distance-vector routing protocol answer: Only neighbors What is one disadvantage of static routing? answer: The network administrator must manually update the routing table wheneve r a topology change occurs Which OSI Layer is responsible for path determination? answer: 3 What is one advantage of dynamic routing? answer: Adjusts automatically to topology or traffic changes What will happen if routers have different sets of LSAs? answer: Routes become unreachable because routers disagree about a link What do distance vector algorithms require of routers? answer: Periodically send its routing table to its neighbors What does a router use to identify the destination network (LAN) of a packet wit hin an internetwork? answer: Network address Which protocol is a hybrid routing protocol? answer: EIGRP What is a network with only one path to a router called? answer: Stub network Which part(s) of an IP address is used by the router for path determination? answer: Network Which metric measures the passage of a data packet through a router? answer: Hop Which command should identify destination network addresses and next hop pairs? answer: Router> show ip route

Which task is configured globally? answer: Selecting a routing protocol like RIP or IGRP Which command specifies the directly connected networks after an IP routing prot ocol has been enabled? answer: Router(config-router)# network network number If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 After using the router igrp command, why is it necessary to use the network subc ommand? answer: It specifies any directly connected networks to be included in routing t able updates Which metric is used in RIP? answer: Hop count Which routes are automatically determined by the routers? answer: Dynamic routes Which type of route is used when no other routes are known to the destination? answer: Default How often are RIP updates broadcast? answer: Every 30 seconds What is the purpose of the ip default-network command? answer: It is used to establish a default route What is used to measure the trustworthiness of a route? answer: Administrative distance At which OSI Layer would an incorrect subnet mask on an interface be classified? answer: Layer 3 Which variable is used by IGRP? answer: Bandwidth Which type of system occurs when routers are grouped under a common administrati on? answer: Autonomous At which Layer of the OSI model would you classify the loss of network connectiv ity due to a loose patch cable? answer: Layer 1 Which command should display RIP routing updates as they are sent and received? answer: Router# debug ip rip What is the purpose of exterior routing protocols? answer: To communicate between autonomous systems What type of route is configured with the command: ip route 172.16.1.0 255.255.2 55.0 172.16.2.1 answer: Static What is the interval of IGRP routing updates? answer: 90 seconds At which OSI Layer would an incorrect encapsulation type on a serial interface b e classified? answer: Layer 2 Which mode is entered if a valid startup-configuration file is not found after t he IOS image is loaded? answer: Setup What provides sequencing of segments with a forward reference acknowledgment, nu mbers datagrams before transmission, and reassembles the segments into a complet e message? answer: TCP sequence and acknowledgment numbers Which command will restart CDP if it has been disabled on the interface of a rou ter? answer: CDP enable Which statement is true of the count to infinity problem in routing loops? answer: Routers that use hold down timers can overcome the problem. What is the purpose of the IOS enable secret command? answer: To enable the user to enter a password that will be encrypted

How are link-state routing updates triggered? answer: By topology changes Which item best describes the difference between a routed protocol versus a rout ing protocol? answer: Routed protocols are used to carry user data while routing protocols mai ntain tables. Which type of network would typically use a static route for external traffic? answer: Stub network What determines how much data a receiving station running TCP/IP can accept befo re sending an acknowledgment? answer: Window size Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? answer: window size If a router has a serial interface S0 with IP address 107.85.20.2 using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this s ubnet? answer: 107.85.20.15 Which device is normally an example of data circuit terminating equipment (DCE)? answer: Modem Which command can be used to check the boot field setting? answer: Router# show version Which command is used to backup the active configuration file from a router to a network server? answer: copy running-config tftp What is the function of the reload command? answer: It reboots the router Which statements are true when configuring a router to operate with RIP? answer: At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly connec ted network. What is a typical OSI layer 2 error? answer: Improper clock rate settings on serial interfaces What is the first step a Cisco router performs after it is powered up? answer: Performs a POST Which type of protocol controls how and when routers communicate with neighborin g routers? answer: Routing protocol Which item best defines the ping command? answer: Uses ICMP echo packets to verify connectivity and proper address configu ration at the internet layer. Which configuration register mode causes a router to boot from the ROM monitor m ode? answer: 0x---0 Which metric is used in RIP? answer: Hop count What is exchanged to provide communication between two hosts' source and destina tion OSI peer layers? answer: Packet data units Which router component provides working memory for configuration files and routi ng tables? answer: RAM Which listing BEST describes commands that can be used to test a network? answer: Show ip route, show interfaces, debug, trace, ping, telnet How can a router learn a path to a destination? answer: Dynamic routing Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? answer: OSPF Which statement is true concerning port addressing?

answer: UDP ports 0-255 are for public applications Which level of Cisco IOS allows only view status? answer: User mode What is an example of a global parameter? answer: Router host name If a new LAN is added to an internetwork, which command would add the network to the routing table? answer: Router (config)# ip route 2.0.0.0 255.0.0.0 1.0.0.2 Which command is used to configure a routing protocol? answer: Router(config)# router rip Which command will display statistics for all interfaces configured on the route r? answer: Show interfaces What is used by a routing protocol to determine the best path to include in the routing table? answer: Metric A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the dest ination host? answer: 172.16.8.0 Where does a router search for an IOS image if none is found in flash? answer: TFTP What is used by distance-vector routing protocols? answer: Periodic updates of entire routing table Which layer of the TCP/IP model corresponds to the OSI network layer? answer: Internet Which two layers of the OSI model are described by WAN standards? answer: Data Link Layer, Physical Layer From the following list, what is the correct order of data encapsulation? 1. Seg ments2. Bits3. Packets4. Frames answer: 1-3-4-2 Which condition best describes convergence? answer: When all routers in an internetwork have the same knowledge of the struc ture and topology of the internetwork What is the result of executing the erase startup-config command? answer: It deletes the backup configuration file in NVRAM. Which name is given to a group of routers under a common administration that pre sent a consistent view of routing to the external world? answer: Autonomous system Which Cisco IOS command displays routing table entries? answer: show ip route What is a characteristic of IGRP? answer: The metric for path selection is a composite metric using bandwidth and delay. When sending data to a host on a different network, which address does the sourc e host encapsulate in the IP header? answer: IP address of the destination host Which command causes a router to boot from ROM? answer: Router(config)# boot system rom Which metrics are commonly used by routers to evaluate a path? answer: Bandwidth, load, reliability Which command is used to download a new system image file from a TFTP server to a router? answer: Copy tftp flash Which keys are pressed in the escape sequence to terminate the initial configura tion while in setup mode? answer: CTRL-C How many bits are in the network and subnet portion of a class B network with a subnet mask of 255.255.240.0? answer: 20

Which OSI Layer would an incorrect encapsulation type on a serial interface be c lassified? answer: Layer 2 Which command is used to turn off the name-to-address translation in a router? answer: no ip domain-lookup Which representations have the same meaning when representing the subnet mask? answer: 21 and 255.255.248.0 What will be generated when the first Ethernet station detects a collision? answer: Jam signal Which switch type provides connections between ports of like bandwidth? answer: Symmetric Which area of memory does the switch use to store destination and transmission d ata? answer: Memory buffer Full duplex requires how many pairs of wires? answer: 2 What is read by a switch to begin the forwarding process and reduce latency? answer: Destination MAC address Switches on a LAN allow the network administrator to do which of the following? answer: Increase the number of collision domains What occurs each time a switch stores an address? answer: Time stamps it Which OSI layer does a router use to make its forwarding decisions? answer: 3 The implementation of switching technology helps to decrease congestion by reduc ing traffic and increasing which of the following? answer: Available bandwidth How do VLANs group network devices? answer: Logically What protocol is used to allow redundant paths in a switched/bridged network? answer: Spanning Tree What type of switching method is used when a switch only reads the destination a ddress before forwarding the frame? answer: Cut-through A LAN switch allows many users to communicate in parallel through which of the f ollowing? answer: Virtual circuits Switches that receive the entire frame before sending it, use what type of frame forwarding? answer: Store-and-forward Which Layer 1 device is used to extend the coverage area of a LAN segment? answer: Repeater Which of the following is the default order of Spanning Tree Protocol states? answer: 3, 4, 1, 5, 2 Which of the following improves the performance of a shared media LAN? answer: Segmenting the network What is used to alleviate congestion? answer: Increase the bandwidth Bridges learn about a network by building a table based on which of the followin g? answer: MAC addresses What percentage of bandwidth is available in each direction when using full-dupl ex? answer: 100% Which of the following does a switch use to make forwarding decisions? answer: A MAC address Users may be reassigned to different VLANs using which of the following? answer: Software Which device is used to reduce or eliminate broadcast related problems? answer: Routers

According to the IEEE, what is the acceptable way to implement VLANs? answer: Frame tagging A VLAN makes up a switched network that is logically segmented by all of the fol lowing EXCEPT: answer: Collison domains What is the term used when switch ports are automatically assigned to a VLAN? answer: Dynamic What is a VLAN used to create? answer: Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? answer: Firewalls What would be the preferred type of link of a VLAN backbone? answer: High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? answer: Dynamic A VLAN is based on which type of grouping? answer: Logical How can access be controlled on a secured VLAN? answer: All of the above Which technique examines particular information about each frame? answer: Frame filtering Dynamic VLANs can be based on which of the following? answer: All of the above 001. A name server is _______ for a host if it always has a DNS record that tran slates the host's hostname to that host's IP adress. answer: Detective 002. In the DNS, the names are defined in ____________ structure answer: A tree 003. The purpse of ICMP echo request and ICMP echo reply messages is to _______. answer: report errors 004. Which one is correct about P2P network? answer: A user computer can be both client and server 005. In the PPP frame, the ____ field defines the contents of the data field. answer: Protocol 006. What is cut-through operation in switches? answer: They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived 007. FTP uses port 21 for sending ____ and port 20 for sending _____. answer: Identification and password .... Data file 008. Which one is not in UDP segment header? answer: Receiving Window Size 009. In TCP congestion control, two important variables the sender has to keep t rack are answer: Threshold and Receiving window 010. Which of the following is the MAC protocol? answer: CSMA/CD 011. Which statement is correct about packet switching and circuit switching?

answer: With the same delay performance, packet-switching allows more number of users than circuit switchin 012. The core of the Internet consist of: answer: Routers 013. Main reason of packet loss in the Internet is ______. answer: Routers drop packets because their buffers are full 014. Which delay mainly depends on the congestion of the network? answer: Congesting delay 015. In IP fragmentation, a datagram is fragmented into two packets, then the fi rst packet has answer: Offset = 0 and FragFlag = 1 016. Which statement is correct about router? answer: Each interface to have an unique IP address 017. What is incorrect about Web cache (proxy server)? answer: None of them 018. Generic router architecture includes answer: All of them 019. _______ applications typically uses _____ __________ answer: Loss-tolerant .... UDP 020. What is the total delay for transmission of 1.25 megabytes of images over f iber optic cable with distance of 3000 km with transmission rate of 1Gbps (ignor e all other delays). Assume that the speed of propagation is 300,000km/sec. answer: 11msec 021. This job of delivering the data in a ______ to the correct ______ is called de-multiplexing answer: transport-layer segment .... application process 022. Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of ___________ answer: TCP congestion control 023. What is NOT a function of a router? answer: Working with IP adress 024. What is the framing method used in PPP? answer: Byte stuffing. 025. A datagram is fragmented into three smaller datagrams. Which of the followi ng is true? answer: The identification field is the same for all three datagrams. 026. _______ is a supplementary protocol that allows non-ASCII data to be sent t hrough email answer: MIME 027. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses that can be assigned to this subnet.

answer: 129.17.129.96 - 129.17.129.127 028. The Link State (LS) algorithm results in ... answer: The least cost path from one node to all nodes in the networks 029. Which of the following is the pipelining protocol: answer: Selective Repeat 030. The transport layer protocol provides logical communication between answer: Processes ... Host 031. What are the two methods of circuit switching for dividing bandwitdth? answer: FDM and TDM 032. Which one is correct about Denial of Service (DoS) attack? answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 033. In the exponential backoff phase of CSMA/CD for a 10Mbps Ethernet answer: 512 microseconds 034. Channel partitioning, random access, and taking turns are _____ answer: MAC protocols 035. The time-to-live (TTL) field in the datagram is included to insure that dat agrams _____ answer: Do not circulate forever in the network that together implement the DNS distributed database, store ______ for the hostn ame to IP address mappings answer: Resource Records ... Name servers Why CSMA/CD is not used in WiFi? answer: Because of the hidden termnal problem and fading problem, it is difficul t to detect collision of signals Traceroute command uses answer: ICMP The DNS protocol runs over ____ and uses port _____ answer: UDP .... 53 rdt3.0 provides reliable data transfer over a ______ answer: Lossy channel with bit errors In the transmission delay calculation t = L/R, what is R? answer: Link bandwidth of the link In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, the congestion window will answer: Remain 16 Which layer in the Inernet that connects directly to wire? answer: Physical CSMA/CA belong _______ group, one of three broad classes of MAC protocols answer: Random access In OSI model, as data packet moves from the lower to the upper layer header are answer: removed

In TCP, what can happen if the timeout is smaller than the connection's round-tr ip time answer: It can result in unnecessary retransmissions. The broadcast MAC address in LAN is answer: FF-FF-FF-FF-FF-FF What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically answer: DHCP Each TCP segment has ____ bytes of header overhead whereas UDP has ____ bytes of overhead answer: 20 ... 8 Very popular browser-based email services such as Hotmail or Yahoo! Mail use ___ _ to transfer email between the client an the server. answer: HTTP IMAP is designed to allow users to manipulate ______, so it is more ____ than PO P3 answer: Remote mailboxes .... complex When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? answer: 011 The combination of an IP address and a port number is called a _____ answer: socket Two-dimensional parity check can _______. answer: Detect a single bit error and correct it The _____ is the physical path over which a message travels answer: Medium The information to be communicated in a data communications system is the ______ . answer: Message Frequency of failure and network recovery time after a failure are measures of t he ____ of a network answer: Reliability A _____ connection provides a dedicated link between two devices answer: point-to-point ____ refers to the physical or logical arrangement of a network answer: Topology A _____ is a data communication system within a building, plant, or campus, or b etween nearby buildings answer: LAN ______ is a collection of many separate networks answer: An internet ______ is an idea or concept that is a precursor to an Internet standard answer: RFC

In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's ______ layer answer: session HDLC is an acronym for ________ answer: High-level data link control Datalink control deals with the design and procedures for _____ communication answer: node-to-node ; host-to-host ; device-to-device ______ in the data link layer separates a message from one source to a destinati on, or from other messages going from other sources to other destinations. answer: Framing In _____ framing, there is no need for defining the boundaries of frames answer: Fixed-size Byte stuffing means adding a speacial byte to the data section of the frame when there is a character with the same pattern as the ______ answer: flag In cyclic redundancy checking, what is th CRC? answer: The remainder The most common protocool for point-to-point access is the Point-to-Point Protoc ol (PPP), which is a _____ protocol answer: byte-oriented High-level Data Link Contron (HDLC) is a _____ protocol for communcation over po int-topoint and multipoint links answer: bit-oriented _____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. answer: Flow In PPP, the ____ is responsible for establishing, maintaining, configuring, and terminating links. answer: LCP Thick Ethernet can be extended to _____ meters per segment answer: 500 _____ This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time answer: collision How "big" is an IPv6 Internet address? answer: 128 bits What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? answer: allow for more Internet addresses What is the size, in bits, of the Net_ID field in a Class B Internet address? answer: fourteen bits What does the "time-to-live" field (8 bits) do in an IP header? answer: prevents infinite looping

Which option is not IP options? answer: Quality of service When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _____ answer: MTU If the fragment offset has a value of 100 and MF = 1, it means that answer: the datagram has not been fragmented A datagram is fragmented into three smaller datagrams. Which of the following is true? answer: The identificatioon field is the same for all threee datagrams In IP Header, IHL field value of decimal 10 means _____ answer: there are 40 bytes in the header What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28 answer: 12.2.2.112 A TCP segment is encapsulated in _____ answer: an IP datagram In TCP, the value of the acknowledgment field in a segment defines the number of the ____ byte a party expects to receive answer: next TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ______ byte carried in that segment. answer: first Connection establishment in TCP is called _____ hanshaking answer: three-way In TCP, Nagle's algorithm can solve the silly window syndrome created by the ___ _ answer: sender In TCP, Clark's solution can solve the silly window syndrome created by the ____ _ answer: receiver TCP allows the sending process to deliver data as a _____ of bytes and allows th e receiving process to obtain data as a _____ of bytes answer: stream ; stream In RTP, ______ are used to number the packets of a real-time answer: Sequence numbers The file linked to the song title is not the actual music file. Instead, it is w hat is called .. answer: metafile In the H.323 protocol stack the protocol ____ is needed to allow the terminals t o negotiate which one they are going to use. answer: RTCP The error introduced by the fiinite number of bits per sample is called .. answer: quantization noise

______ is an applicatioon protocol that establishes, manages, and terminates mul timedia session answer: SIP ______ is a standard to allow telephones on the public telephone netwoork to tal k to computers connected to the Internet answer: H.323 An HTTP request message always contains ______. answer: a request line and a header In HTTP, the first line in a request message is called a _____ line; the first l ine in the respnose message is called the _____ line. answer: request ; status A cookie is made by the ______ and eaten by the _____ answer: server ; server ______ is a technology that creates and handles dynamic documents answer: CGI _____ is a repository of information linked together from points all over the wo rld. answer: The WWW Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7

In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment?

Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1

Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41

What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover

message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address).

Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74

Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the

source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic

Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP

? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117

UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20

Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message .

Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing .

Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? meters per segment. protocol for communication over point

Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. . . .

Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult

imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12

ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network

17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and

electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an

d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above

18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is

: Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are

Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to:

Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________

Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a

nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used? Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol

.10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response. Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______

Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize

d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23?

Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct

At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address

es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to :

Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____ Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram

Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size

10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b

TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are..

Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start

.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET

Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use? Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma

il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP

Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet

The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64 NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency?

Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) ) What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1

This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP

A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts

Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer:

1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal 1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible?

answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks. answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing.

Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver? Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18

Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29

Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34 Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer?

Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network? Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP

Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63

What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport). Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment?

Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address. Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP

Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides? Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95

The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4

Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110 CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has

Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128

FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is: Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140

The information to be communicated in a data communications system is the Answer: Message Question 141

Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 .

in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits meters per segment. protocol for communication over point

Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 . . .

In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r handshaking. .

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise

Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___ Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check)

Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct

14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct

32. Answer: 33. Answer: 34. nswer. Answer: 35. Answer:

The difference between TCP and UDP is primarily one is connection-oriented, one is connectionless In classless addressing, ___ is assigned to an organization. a fixed number of blocks In ___ resolution, the resolver expects the server to supply the final a recursive By default, FTP uses which ports? 80 and 8080

Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen

ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______.

Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is :

Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this?

Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________.

Answer: maskWhy NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use

to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5% 21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed

25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for? Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation

Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct

6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing Quiz Chapter6 1. What is the data unit used in TCP? Answer: Segment 2. What is the service that the UDP protocol provides? Answer: Guaranteed delivery 3. What flag is used to close TCP connection? Answer: FIN 4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable

9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number Quiz Chapter7 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents Quiz Chapter1 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users?

Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are Quiz Chapter4 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair Quiz Chapter5 11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data

field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 1. One important role of the Network Layer is to: Answer: D. Perform network routing, i.e., to find the most efficient transmissio n route between two computers. 2. Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.1 1g : 54Mbps belong to : Answer: B. Local area networks(LAN) 3. One important role of the Transport Layer is to: Answer: B. to multiplex and de-multiplex messages 4. Ethernet is Answer: . a type of LAN (Local area networks) 5. The difference between TCP and UDP is : Answer: A. TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections 6. Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCO NNECT Answer: B. Connection-oriented services in the transport layer 7. As learned in class, computer networks are classified based on: Answer: D. Switching, distance 8. One of the most importance purpose of computer network is to (select one BEST answer) Answer: B. share the common resource 9. Base on distance, two MOST IMPORTANT types of computer network are: Answer: C. Internet and Local area networks 1. in sliding window Flow control with window size of W, the source _____ Answer: D. sends up to W frames without ACK 2. Flow control____ Answer: . ensures the sender does not too much data that may overwhelm the recei ve + has two techniques : Stop and Wait and Sliding window 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: . datagram network and virtual-circuit network

Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic 1.4.What is the throughput of a link in a network? Answer: . Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: . TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay 1.9.A set of rules or guidelines that govern interactions between two computer s ystems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 1.1.In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: *A. Removed 1.2.There are two broad classes of packet-switched networks are: Answer: *B. datagram network and virtual-circuit network 1.3.Which one is correct about Denial of Service (DoS) attack? Answer: D. Attackers make network resources unavailable by overwhelming resou rce with bogus traffic 1.4.What is the throughput of a link in a network? Answer: C. Number of bits travelling through the link in a unit time 1.5.Any network that routes packets according to host destination addresses is a ________ Answer: . Datagram network 1.6.Which statement is correct for "layering" in OSI model Answer: E. Layering allows easy and maintain and updating the system; changin g the protocol of one layer does not affect the others 1.7._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: . Propagation delay .A set of rules or guidelines that govern interactions between two computer syst ems in a computer network is called_____ Answer: A. Network protocols 1.10.A packet of L bits is transmitted via the link with the transmission rate o f R bits/sec; the transmission delay is Answer: C. L/R 2.1.Which one is correct about P2P network? Answer: C. A user computer can be both client and server .2.HTTP uses the services of _________ on well-known port 80. Answer: . TCP 2.3._____ provides reliable, in-order transfer of bytes between client and serv er Answer: *E. TCP 2.4.A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc. Answer: A. Objects 2.5.How long does it take to download an object from a Web Server to a client if

using non-persistent HTTP? Answer: A. The summation of Two Round Trip Times and the Transmission Time 2.6.Which one(s) is (are) correct about Decentralized DNS? Answer: . All of the others 2.7.SMTP stands for Answer: A. Simple Mail Transfer Protocol 2.8.FTP uses ____ connection to the server with port numbers ____. Answer: *E. TCP . 20 and 21 2.9.IMAP and POP are_________ Answer: *A. Mail access protocols 2.10._________ is a supplementary protocol that allows non-ASCII data to be sent through email. Answer: *E. MIME 3.1.TCP provides __________between application processes running on different ho sts Answer: . Logical communications 2.What is WRONG about UDP? Answer: *A. Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: *C. Multiplexing 4.In the ________ algorithm of the TCP congestion control, the size of the conge stion window increases exponentially until timeout Answer: . Slow start 5.If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: C. 136 6.Which one is correct about TCP and UDP? Answer: *A. TCP is reliable transmission and it has congestion control a nd flow control while UDP is not 3.7.What flag is used to close TCP connection? Answer: A. FIN Answer: 3.8.The difference between flow control and congestion control is primar ily Answer: *A. One is to avoid overflowing the receiver s buffer; one is to a void congestion of the channel 3.9.TCP is a ___________ protocol. Answer: *A. Connection-oriented Answer: 3.10.TCP assigns a sequence number to each segment that is being sent. T he sequence number for each segment is the number of the _______ byte carried in that segment. Answer: *A. First 4.1.What is the data unit used in Internet Protocol (IP)? Answer: *A. Datagram 4.2.DHCP is used by the server to: Answer: *A. Assign IP addresses to clients automatically 4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ k and the remaining bits are used for host. How many subnets and hosts in each s ubnets can be addressed? Answer: *A. 32 subnets and 8 hosts 4.4.Why NAT (Network Address Translation) is used?

Answer: *A. All of them 4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000 -byte datagram is fragmented into _______ datagram(s) Answer: *A. 2 .6.Traceroute command uses Answer: A. ICMP 7.RIP (Routing Information Protocol) in the Internet uses Answer: *A. Distance vector routing algorithm 4.8.Routers operate in the _______ layers. Answer: *A. network 4.9.Dijkstra s algorithm is Answer: *A. A link-state routing algorithm 4.10.Distance vector routing algorithm requires Answer: *A. all nodes to know link costs to their neighbours 5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder Answer: D. 0000 5.2.______ is (are) (an) example(s) of random access MAC Answer: A. All of them 5.3.In cyclic redundancy checking, what is CRC Answer: B. the remainder 5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: *D. Wireless LAN 5.5.What is store-and-forward operation in switches? Answer: A. They receive the whole frame before forwarding to next station 5.6.______is used in Ethernet Answer: A. CSMA/CD 5.7.Which one is the flag used for framing in PPP? Answer: *B. 01111110 5.8.Which one can be a MAC address? Answer: *A. 00-D0-56-F2-B5-12 .9.ARP stands for __________ Answer: *A. Address Resolution Protocol .10.Parity checking _____. Answer: A. can detect a single bit error in a transmission 1. In HTTP,a ______ server is a computer that keeps copies of responses to recen t requests Answer: [B] proxy . The_______usually contains the sender address,the receiver address,and other i nformation Answer: B] envelope 3. In the______encoding scheme,24 bits become 4 characters,and eventually are se nt as 32 bits. Answer: [C] base64 4. By default,FTP uses which ports? Answer: ] 20 and 21 . HTTP uses the services of______on well-known port 80 Answer: TCP . In the DNS, the names are defined in_________structure Answer: an inverted-tree _________is a language for creating Web pages. Answer: HTML With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. A________document is created by a Web server whenever a browser requests the doc ument. Answer: dynamic In a________connection,the server leaves the connection open for more requests a fter sending a response.

Answer: persistent . Which of the following statement is correct? Answer: Full-Duplex :Communications in which both sender and receiver can send a t the same time In cyclic redundancy checking,what is CRC Answer: the remainder IP is________datagram protocol Answer: unreliable In the________algorithm the size of the congestion window increases exponentiall y until it reaches a threshold. Answer: slow start TCP uses___________to check the safe and sound arrival of data. Answer: an acknowledgment mechanism . In the OSI model,encryption and decryption are functions of the________layer. Answer: presentation In________resolution,the resolver expects the server to supply the final answer Answer: recursive . The purpose of echo request and echo reply is to Answer: check node-to-node communication . HDLC is a_______protocol Answer: bit-oriented . To accomplish flow control,TCP uses a_________window protocol. Answer: sliding TCP allows the sending process to deliver data as a______of bytes and allows the receiving process to obtain data as a_______of bytes. Answer: stream ;stream In sliding window flow control,if the window size is 63.What the range sequence numbers? Answer: 0 to 63 In the OSI model,what is the main function of the transport layer? Answer: process-to-perocess message delivery Why was the OSI model developed? Answer: ] standards were needed to allow any two systems to communicate ________is more powerful and complex than______ Answer: IMAP4;POP3 In moderm implementations of TCP,a retransmission occurs if the retransmission t imer expiers or_______duplicate ACK segment have arrived Answer: three 27. _______is the protocol suite for the current Internet Answer: C] TCP/IP 28. A set of rules or guidelines that govern interaction among people,between pe ople and machines ,and among machines is called______ Answer: D] protocols 29. the connection establishment procedure in TCP is susceptible to a serious pr oblem called the______attack. Answer: D] none is correct 30. To accomplish flow control,TCP uses a______window protocol. B Answer: sliding Answer: 31. What network device decreases collision? Answer: C] SWITCH 32.At the CRC generate,_______added the data unit before division process Answer: ] 0s are 33. Jitter is introduced in real-time data by the______ Answer: B] delay between packets .What does the URL need to access a document Answer: all are correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP

What flag is used to close TCP connection? Answer: FIN Maximum number of data flow through in N-port switch (LAN switch L2): Answer: N/2 Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and local area network. One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers. One important role of Transport Layer is to: Answer: To multiplex and de-multiplex messages. The difference between TCP and UDP is : Answer: TCP is a protocol in Network Layer while UDP is in the Transport Layer. Ethernet is Answer: A type of LAN As learned in class, computer networks are classified based on: Answer: Distance, switching Following standard: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to: Answer: LAN DHCP is used to Answer: Assigned IP addresses automatically A binary file is 3375 bytes long. How long will it be if encoded using base64 en coding, with a CR+LF pair inserted after every 85 bytes sent and at the end ? Answer: 4604 What type of service that VC network provides? (A) Answer: Connection-oriented The physical layer is concerned with the movement of ___ over the physical mediu m. Answer: bits An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompress ed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18.874 sec The ___ model shows how the network functions of a computer ought to be organize d. Answer: OSI ___ audio/video refers to on-demand request for compressed audio/video files. Answer: Interactive If ASCII character H is sent and the character I is received, what type of error s is this? Answer: single-bit If ASCII character D is sent and the character G is received, what type of error s is this? Answer: multiple-bit What type of routing protocol that BGP is? Answer: Link State Routing A bridge has access to the ___ address of a station on the same network. Answer: physical The ___ layer is responsible for the delivery of a message form one process to a nother. Answer: transport Routers function in the ___ layers. (A) Answer: data link and network The purpose of MTA is Answer: Transfer all of message across the Internet Which IP option is used if exactly four specific router are to be visited by the datagram? Answer: strict source route What is the service that the UDP protocol provides? (C) Answer: error detection

What is information used to route packet in network? Answer: destination address, source address, and protocol fields in IP header Because the sending and the receiving processes may not write or read data at th e same speed. TCP ___(B) Answer: uses buffers ___ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium. Answer: 10BASE-T The ____ domains define registered hosts according to their generic behaviour Answer: a. Generic A packet whose destination is outside the local TCP/IP network segment is sent t o the Answer: Default gateway Which piece of information is not vital for a computer Answer: DNS server In the OSI model, as a data packet moves from the lower to the upper layers, hea ders are _______. Answer: added Session layer of the OSI model provides Answer: dialog control IPv6 has _______ -bit addresses. Answer: 128 Which of the following can be an Ethernet physical address? Answer: 07:01:02:01:2C:4B An IP address contains________ bits ? Answer: 32 Which routing protocol below is used by exterior routers between the autonomous systems? Answer: BGP Which of the IP headers decides when the packet should be discarded? Answer: TTL(time-to-live) Which IP address is reserved for software loop-back? Answer: 127.x.x.x What is the network ID for a computer whose IP address is 190.148.64.23? Answer: 190.148 Which port is reserved for use of the SMTP protocol? Answer: 25 Howmany IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? Answer: 62 Which of the folowings is not a direct implication of subnet masks in TCP/IP net works? Answer: Assignment of more IP addresses Which agency developed standards for physical connection interfaces and electron ic signaling speccifications? Answer: EIA In the OSI model, which layer functions as a liaison between user support layers and network support layers? Answer: c. Transport layer The Physical layer is connected with the movement of____over the physical medium . Answer: a. Bits Which of the following statement is correct? Answer: c. Half-Duplex: Communications in which both sender and receiver ca n send at the same time What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards MAN stands for? Answer: a. Multi-Access Network In the OSI model, as a data packet moves from the lower to the upper layers, hea

ders are____ Answer: Removed Which of the following is an appropriate description concerning B2C? Answer: Ordering books online Which of the following is an appropriate description concerning mobile network u sers? Answer: A notebook computer used in a class In the OSI model, encryption and decryption are functions of the_____layer Answer: Presentation If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst At the CRC generate, added the data unit before division process. Answer: a. 0s are According to the PPP transition state datagram, exchange of user control and dat a packets occurs in the state Answer: Establishing According to the PPP transition state datagram, verification of user identificat ion occurs in the state Answer: Authenticating At the CRC checker,______if the data unit is damaged Answer: A nonzero remainder HDLC is a________protocol Answer: Bit-oriented If ASCII character H is sent and the character I is received, what type of error is this? Answer: a. Single-bit In cyclic redundancy checking, what is CRC Answer: The remainder In sliding window flow control, if the size is 63, what the range sequence numbe rs? Answer: 0 to 63 What is present in the HDLC control fiels for I-frame Answer: All are correct At the CRC generate, ___ added the data unit before division process. Answer: c. 0s are What device can . Answer: All Maximun of data flow through in N-port switch (an with L2) Answer: N How many collision domains has the computer with 88 computers, 10hubs and 2 repe aters? Answer: 1 Repeaters function in the layer Answer: Physical Which cable type used for segment lenth more than 2000m. Answer: Fiber optics What network device decreases collision switch Answer: Transceiver _____specifies a physical star topology central hub . Answer: Twisted-pair What is the protocol that network devices (for example: modern ADSL) use to assi gn IP address to PCs in LAN automatically? Answer: DHCP What is information used to route packet in network? Answer: Destination Address fields in IP header What type of routing algorithm that OSPF use? Answer: Shortest Path Routing What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data

field What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: . All are correct IP is________datagram protocol Answer: Both a and b In classless addressing,_______is assigned to an organization. Answer: A variable-length block Which layer does ICMP reside in? Answer: Physical DHCP is used to Answer: Assign IP addresses automatically What is protocol used to inform errors concerning IP? Answer: ICMP In classless addressing, the ______ is another name for the common part of the a ddress range. Answer: prefix In classless addressing, the _______ is the varying part (similar to the hostid) . Answer: suffix In classless addressing, the prefix length defines the _____________. Answer: mask The number of addresses assigned to an organization in classless addressing ____ ___. Answer: must be a power of 2 The first address assigned to an organization in classless addressing _______. Answer: must be evenly divisible by the number of addresses Which address could be the beginning address of a block of 32 classless addresse s? Answer: 2.4.6.64 Which address could be the beginning address of a block of 16 classless addresse s? Answer: none of the above Which address could be the beginning address of a block of 256 classless address es? Answer: 2.4.6.0 What type of routing protocol that BGP is? Answer: Distance Vector Routing What is the data unit used in TCP? Answer: Segment What is the service that the UDP protocol provides? Answer: Guaranteed delivery What flag is used to close TCP connection? Answer: FIN Because the sending and the receiving processes may not write or read data at th e same speed, TCP______ Answer: Uses buffers The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism TCP is a (n)__________transport protocol. Answer: Reliable What is the combination of an IP address and a port number called Answer: A socket The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a

Answer: Randomly generated number ______is used to compress video. Answer: JPEG According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency. Answer: Two ______is more powerful and complex than______. Answer: IMAP4; POP3 What does the URL need to acess a document Answer: All are correct The purpose of MTA is Answer: Transferal of message across the Internet A_____document is created by a Web server whenever a browser requests the docume nt Answer: Static With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW document available _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive By default, FTP uses which ports? Answer: a. 20 and 21 Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 With WWW as an example of client-server computer software, the client is: Answer: The machine that you use to display WWW documents One important role of the Network Layer is to: Answer: Perform network routing, i.e., to find the most efficient transmission r oute between two computers Following standards: IEEE 802.11b : 11Mbps; IEEE 802.11a : 54Mpbs; IEEE 802.11g : 54Mbps belong to : Answer: Local area networks(LAN) One important role of the Transport Layer is to: Answer: to multiplex and de-multiplex messages Ethernet is Answer: a type of LAN (Local area networks) The difference between TCP and UDP is : Answer: TCP sets up connections, send data, and the terminate the connection whi le UDP just sends data without setting connections Those five primitives ( operations): LISTEN, CONNECT, RECEIVE, SEND and DISCONNE CT are for implementing: Answer: Connection-oriented services in the transport layer As learned in class, computer networks are classified based on: Answer: Switching, distance One of the most importance purpose of computer network is to (select one BEST an swer) Answer: share the common resource Base on distance, two MOST IMPORTANT types of computer network are: Answer: Internet and Local area networks . in sliding window Flow control with window size of W, the source _____ Answer: sends up to W frames without ACK Flow control____

Answer: ensures the sender does not too much data that may overwhelm the receive /has two techniques : Stop and Wait and Sliding window In Stop and Wait Flow control, source____ Answer: . waits for the acknowledgment(ACK) before sending next frame At the CRC checker, ____ if the data unit is damaged Answer: a nonzero remainder CSMA/CD (Carrier sense multiple access/ Collision detection) belongs to ___ whil e CSMA/CA (Carrier sense multiple access/ Collision avoidance) belong to ___ Answer: Ethernet__ Wireless Lan .If ASCII character H is sent and the character I is received, what type of erro r is this? Answer: Single-bit Parity checking ___ Answer: can detect a single bit error in a transmission If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst IP address written as 200.23.16.0/23 means: Answer: both are correct A Virtual Circuit consists of Answer: all are correct What is the last address of a block of classless address if one of the addresses is 12.22.2.127/28 Answer: none of them Answer: In IP fragmentation with MTU(Maximum transfer unit size) = 1500 bytes, a 2000 byte datagram is fragmented into___ datagram Answer: 2 What are general functions of router? Answer: . all are correct An organization is granted a block of classless addresses with the starting addr ess 199.34.76.128/29. How many addresses are granted? Answer: 8 Bridges function in the ___ layers Answer: physical and data link The time to live field in IP datagram Answer: both are correct NAT router must Answer: both are correct In a Datagram networks Answer: all are correct . How big is an IPv6 Internet address? Answer: . 128 bits Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network Answer: time to live Assume that the IP address has only 8 bits, first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne t can be addressed

Answer: 32 subnets and 8 hosts What is tha data unit used in Internet Protocol(IP) Answer: datagram Which device can amplify and make signal to all computer in LAN Answer: . repeater What is the protocol that network devices ( for example: modem ADSL) use to assi gn IP address to PCs in LAN automatically Answer: DHCP TCP is a(an)____ transport protocol Answer: reliable What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window _____ Answer: Reduce to 1 In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ___ duplicate ACK segments have arrived Answer: . three Those following: a) Slow start b) Congestion avoidance c) fast retransmit d) Fas t recovery, are mechanisms of______ Answer: . TCP congestion control If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of Answer: 136 What flag is used to close TCP connection? Answer: FIN In TCP congestion control, when timeout occurs Answer: The threshold congestion window will be set to half of the current windo w size 10. What is the data unit used in TCP Answer: . Segment . What is the combination of an IP address and a port number called? Answer: A socket In the ____ stage of the TCP congestion control, the size of the congestion wind ow increase exponentially until timeout occur. Answer: slow start The value of the acknowledgment field in a segment defines the number of the___ bytes a party expects to receive Answer: next The difference between TCP and UDP is primarily Answer: . One is connection-oriented, one is connectionless TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the ___ byte carried in that segment Answer: . first In HTTP, a ______ server is a computer that keeps copies of responses to recent requests Answer: . proxy With WWW as an example of client-server computer software,the server is: Answer: The machine that makes WWW documents available. In a________ connection, the server leaves the connection open for more requests after sending a response Answer: persistent _____ is a language for creating Web pages Answer: HTML

In the ______encoding scheme, 24 bits become 4 characters,and eventually are sen t as 32 bits. Answer: base64 HTTP uses the services of______on well-known port 80 Answer: . TCP What is the total delay for transmission of 2000Mb of text over fiber cable with distance of 3000km with transmission rate of 2Gbps (ignore all other delay) Answer: 10msec Which layer does ICMP functions? Answer: network layer A ________ document is created by a Web server whenever a browser requests the d ocument. Answer: dynamic Why CSMA/CD (Carrier sense multiple access/ Collision detection) (that is used i n Ethernet) can NOT be used in Wireless LAN Answer: both of them Which statement is best correct about UDP and TCP? Answer: all of them . A sequence of 72 bits, after encoding using BASE64, become a sequence of Answer: 96 bits By default, FTP uses which ports? Answer: 20 and 21 In the DNS, the names are defined in_________structure Answer: an inverted-tree Which one best describes the advantage(s) of using cache in proxy server? Answer: Reduce the delay time to download content from the remove a remove web s erver In cyclic redundancy checking, what is CRC Answer: the remainder . In sliding window flow control. If the window size is 63. What the range seque nce numbers Answer: . 0 to 63 IP is _____ datagram protocol Answer: both a and b TCP uses __________ to check the safe and sound arrival of data Answer: . an acknowledgment mechanism . Which one is best correct for IMAP(Internet Mail Access Protocol) Answer: All of them HDLC is a ________ protocol Answer: bit-oriented Protocol used to exchange email between email server is: Answer: SMTP In the OSI model, encryption and decryption are functions of the ____ layer Answer: presentation The purpose of echo request and echo reply is to Answer: check node-to-node communication . To accomplish flow control, TCP uses a___________ window protocol Answer: sliding Which of the following statement is correct? Answer: Full-Duplex: communication in which both sender and receiver can send at the same time. In______ resolution, the resolve expects the server to supply the final answer Answer: recursive If the ACK value is 200, then byte_____ has been received successfully Answer: 199 . Which one is the returned code of the response from a web server when a client successful connects to the web server Answer: 200 . ______ algorithms are more efficient for short messages Answer: Asymmetric-key

Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time to live How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip and the Transmission Time Which one is best correct about symmetric-key cryptography and asymmetric-key cr yptography? Answer: Symmetric-key cryptography has the same key both sender and receiver whi le asymmetric-key not What are general functions of router? Answer: All are correct What type of service that VC network provide? Answer: Connection-oriented The purpose of MTA (Mail Transfer Agent) is Answer: . Transferal of message across the Internet We can divide audio and video services into ____ broad categories. Answer: three A three-character data frame: A FLAG B when framing methods using Flag bytes wit h stuffing, the output will be: Answer: A ESC FLAG B . Which protocol helps to transfer non-plain text files such as image or audio f iles via SMTP email systems? Answer: MINE Which statement is correct about Error Control in TCP/IP model Answer: Error Control is implemented in both Data Layer and Transport Layer What is the IP address used to test a PC s network card that don t need connect PC t o another PC? Answer: all are correct A _____ server loads all information from the primary server Answer: secondary The value of receiving window size is determined by ____ Answer: the receiver In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Any network that routes packets according to host destination addresses is a ___ _____ Answer: Datagram network Which statement is correct for "layering" in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer ._______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R

Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP ._____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: . The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the others SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols ._________ is a supplementary protocol that allows non-ASCII data to be sent thr ough email. Answer: . MIME .TCP provides __________between application processes running on different hosts Answer: . Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver .In the transport layer, the job of gathering data at the source host from diffe rent application processes, enveloping the data with header information to creat e segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest ion window increases exponentially until timeout Answer: Slow start .If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily Answer: . One is to avoid overflowing the receiver s buffer; one is to avoid co ngestion of the channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP is used by the server to: Answer: Assign IP addresses to clients automatically .Assume that the IP address has only 8 bits; first 5 bits are used for network a nd the remaining bits are used for host. How many subnets and hosts in each subn ets can be addressed? Answer: . 32 subnets and 8 hosts Why NAT (Network Address Translation) is used?

Answer: All of them The purpose of ICMP echo request end ICMP echo reply is to . Answer: report errors in the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Which of the following is characteristic of packet switching? Answer: Bandwidth shared. How does the HTTP protocol implement caching? Answer: using proxy server. What begins an Ethernet frame? Answer: Preamble. The physical medium used in the Ethernet cable that comes in to your PC is ____ Answer: All of the others What is information in IP header used to route packet in router? Answer: Destination Address end Source Address fields Traceroute (tracert in Windows) sends Answer: ICMP messages Which of the following is the MAC protocol? Answer: CSMA/CD The signaling protocol is used in: Internet The HTTP request line contains a method to request a document from the server. Answer: GET Which of the following is the pipelining protocol: Answer: Automatic Repeat Request An HTTP request message always contains . Answer: a request line and a header With the following Manchester encoding, the bit stream transmitted is ___ Answer: 10011101 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record. The OSI layer responsible for interpret meeniiwg of data, e.g., encryption, comp ression, machine-specific conventions is the... Answer: Transport layer. How many duplicate ack-numbers triggar tha Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event. CSMA/CA belong ______ group, one of three broad classes of MAC protocols. Answer: Multiple channels Which of the following describe the DHCP Discover message? Answer: It usas FF:FF:FF:FF:FF:FF as a Iayer 2 broadcast. What type of routing algorithm that OSPF use?

Answer: Link State Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F The default mode of HTTP 1.1 is ___ Answer: Persistent connection with pipelining The combination of an IP address and a port number is called a ______. Answer: process identifier The receiver window is found in ____ Answer: only ACKs Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. What are the sequence number in the second segment? Answer: 165 What is the name of the packets processed at the network layer? Answer: Datagram Which of the following is hybrid of client-server and P2P? Answer: Skype What is the protocol used to obtain email from to an email server: Answer: IMAP What field in the IP header changes when a datagram is forwarded by a simple rou ter? Answer: Destination IP address Which type of DNS record is used by mail servers to determine where to send e-ma il? Answer: MX record What is the MAC protocol used in 802.11 network? Answer: CSMA/CA when you use ftp client (an utility in Windows), what is command used to get fil es from ftp server? Answer: retr Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addr esses that can be assigned to this subnet. Answer: 129.17.129.96 - 129.17.129.127 when compared to transmission delay, propagation delay is always ____. Answer: no restrictions, may be greater or smaller Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is t he subnet address? Answer: 201.14.78.64 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD Your normal PC requests a DNS to do a search: Answer: recursive

What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: authoritative A switch processes up to which layer? Answer: Transport ______ uses dedicated links directly connected from end-to-end Answer: Circuit switched network This command identifies the receiver cf the message. Answer: RCPT TO lf the fragment offset has a value of 100 and MF = 0, it means that_____ . Answer: this is the last fragment. Which of the following is NOT a message of DHCP? Answer: DHCP response Which of the following is the service of link layer'? Answer: Error detection which the following is the individual characteristic of rdt3.0? Answer: Sequence number added to packet. An process-to-process communication up to which layer? Answer: Transport Which the following is the individual characteristic of switch? Answer: Maintain a routing table. Which transport layer was first used for streaming media? Answer: UDP Most Internet services and intelligence is located: Answer: in ISPs The backbone ofthe Internet is run by: Answer: Tier-1 ISPs The core of the Internet consiste of: Answer: Ethernet What is the function of ARP? Answer: It resolves host names to IP addresses. which of the following is NOT mechanisms used to provide for reliable data trans fer? Answer: Timers What is the one's compliment 8-bit checksum of the following 8-bit binary number s: Answer: 10010101 and 10101010. 00111111 What is the framming method used in PPP? Answer: Byte stuffing UDP is called a __________ transport protocol. Answer: connectionIess, unreliable

When CRC is calculated, consider the 4-bit generator G = 1001 and suppose that D has the value 111010. What is the value of R? Answer: 011 Which protocol is better for real-time video application overthe Internet in ter m of minimizing the delay? Answer: UDP A datagram is fragmented into three smaller datagrams, Which of the following is true? Answer: The identification field is the same for all three datagrams. ____audio/video refers to the broadcasting of radio and TV programs through the Internet Answer: Streaming live The second phase of JPEG is_______ Answer: Quantization In the DNS, the names are defined in structure Answer: an inverted-tree Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts What is the combination of an iP address and a port number called? Answer: A socket NAT used at the router to Answer: translate the port number of the host In the subnet side to the port num ber outside the subnet The advantage of UDP is Answer: Faster than the TCP In the OSI model, which of the following is an application layer service? Answer: all are correct Urgent data requires the urgent pointer Held as well as the URG bit in the field , Answer: Control What are general functions of router? Answer: All are correct Because the sending and the receiving processes may not write or read data at th e same speed, TCP Answer: uses buffers A user needs to send the server some information. The request line method is__ Answer: POST The purpose of MTA (Mail Transfer Agent) is Answer: Transferal of message across the Internet In the encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits, Answer: base64

NAT table in router Answer: Store pairs of the IP address of the host with the port number in form o f (IP address, port #) Those fallowings: a) Slow start b) Congestion avoidance c) Fast retransmit d) Fa st recovery, are mechanisms of._____ Answer: TCP congestion control In error reporting the encapsulated ICMP packet goes to Answer: the original sender Whic h of the following statement is correct? Answer: Full-Duplex: Communication s in whic h both sende r and receiver ca n se n d at the same time Which field in the IP header is used to prevent an IP packet from continuously l ooping through a network? Answer: Time-to-Live (TTL) What does NAT stand for? Answer: Network Address Translation The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called Answer: Port number Jitter is introduced in real-time data by the_____ Answer: Difference of the delay among packets Bridges work in the layers. Answer: physical and data link A TGP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 4-msec one-way delay, What is the line efficiency? Answer: 2,6% What is the data unit used in Internet Protocol (IP)? Answer: Datagram An HTTP request message always contains________ Answer: a request line and a header DNS can use the services of _____ using the well-known port 53, Answer: UDP The _____domains define registered hosts according to their generic behavior, Answer: Generic TCP assigns a sequence numberto each segment that is being sent, The sequence nu mberfor each segment is the number of the byte carried in that segment, Answer: First A set of rules which is used by computers to communicate with each other across a network is called___ Answer: Network protocols Which one(s) is (are) routing algorithm(s)for IP? Answer: Both (Distance vector algorithms (DVA)) and (Link-state algorithms (LSA) )

What is the default subnet mask for a Class C network? Answer: 255.255.255.0 The OSI model consists of ____ layers, Answer: Seven In Congestion avoidance of TCP congestion control, when timeout occurs, the cong estion window____. Answer: Reduces to 1 Parity checking____ Answer: can detect a single bit error in a transmission Many coding systems include an extra bit called a , for error detection purpose s, Answer: parity bit Which part of the mail created by the UA(User Agent) contains the sender and rec eiver names? Answer: Header Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNE CT are for implementing Answer: None of these Flow control_____ Answer: ensures the sender does not too much data that may overwhelm the receive r Which ones are correct for Repeaters? Answer: To increase the transmission distance Relating to CRC, a sequence of bits 100101 can be presented as polynomial Answer: x^5+x^2+1 This command identifies the sender of the message, Answer: MAIL FROM Assume that Seoul National University is assigned with IP addresses written as 194.6.96.0/30, what is the first address and the lass address of the university Answer: 194.6.96.0 and 194.6.96.255 With WWW as an example of client-server computer software, the server is: Answer: The machine that makes WWW documents available, What is the service that the UDP protocol provides? Answer: None is correct What is the protocol that network devices (for example: modem ADSL) use to assig n IP address to PCs in LAN automatically? Answer: DHCP In CRC, if the generator is x^4+x+1, then which one is added into the frame befo re dividing Answer: 0000 In OSI model, as data packet moves from the lower to the upper layer header are.. Answer: Removed

There are two broad classes of packet-switched networks are: Answer: datagram network and virtual-circuit network Which one is correct about Denial of Service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming resource wi th bogus traffic What is the throughput of a link in a network? Answer: Number of bits travelling through the link in a unit time Which statement is correct for layering in OSI model Answer: Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others _______ is the protocol suite for the current Internet. Answer: TCP/IP The time required for a data bit to travel through the link from router A to rou ter B is Answer: Propagation delay A set of rules or guidelines that govern interactions between two computer syste ms in a computer network is called_____ Answer: Network protocols A packet of L bits is transmitted via the link with the transmission rate of R b its/sec; the transmission delay is Answer: L/R Which one is correct about P2P network? Answer: A user computer can be both client and server HTTP uses the services of _________ on well-known port 80. Answer: TCP _____ provides reliable, in-order transfer of bytes between client and server Answer: TCP A Web page (also called a document) consists of _______ such as a HTML file, a J PEG image, a GIF image, a Java applet, an audio clip, etc. Answer: Objects How long does it take to download an object from a Web Server to a client if usi ng non-persistent HTTP? Answer: The summation of Two Round Trip Times and the Transmission Time Which one(s) is (are) correct about Decentralized DNS? Answer: All of the other SMTP stands for Answer: Simple Mail Transfer Protocol FTP uses ____ connection to the server with port numbers ____. Answer: TCP . 20 and 21 IMAP and POP are_________ Answer: Mail access protocols _________ is a supplementary protocol that allows non-ASCII data to be sent thro ugh email. Answer: MIME TCP provides __________between application processes running on different hosts Answer: Logical communications What is WRONG about UDP? Answer: Use ACK to notify the sender that the packet has arrived the receiver In the transport layer, the job of gathering data at the source host from differ ent application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______. Answer: Multiplexing In the ________ algorithm of the TCP congestion control, the size of the congest

ion window increases exponentially until timeout Answer: Slow start If the segment has sequence number of 128 and length of 8 bytes, the receiving c omputer will send ACK with value of _________ Answer: 136 Which one is correct about TCP and UDP? Answer: TCP is reliable transmission and it has congestion control and flow cont rol while UDP is not What flag is used to close TCP connection? Answer: FIN The difference between flow control and congestion control is primarily One is to avoid overflowing the receiver s buffer; one is to avoid congestion of t he channel TCP is a ___________ protocol. Answer: Connection-oriented TCP assigns a sequence number to each segment that is being sent. The sequence n umber for each segment is the number of the _______ byte carried in that segment . Answer: First What is the data unit used in Internet Protocol (IP)? Answer: Datagram DHCP(dynamic host configuration protocol) is used by the server to: Answer: Assign IP addresses to clients automatically Assume that the IP address has only 8 bits; first 5 bits are used for network an d the remaining bits are used for host. How many subnets and hosts in each subne ts can be addressed? Answer: 32 subnets and 8 hosts Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000

______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. which method of transport would you use to send goods by haulage? answer: lorry 1112. Which statement is true? answer: counterfeiting takes advantage of other companie's research, advertising etc. 1113. Code for Mouse event handlers: answer: 1114. please remind me that I should not spend more money ______ we have decided spend. answer: which 1115: what is the purpose of a lobby? answer: to change pubkic and govement opinion 1116. I think we will be able to get there _____ six o'clock. answer: nearly 1117. A picture or symbol associated with a certain brand is called.. answer: a trademark 1118. what is a margin? answer: the difference between the buying and selling price 1119. CDs and Videos are pericularly ______ to piracy. answer: vulnerable 1120.LEave the office right away, ______ you will miss the train beacause of the traffic answer: or 1121: I'm looking forward to _______ from yoy soon. answer: hearing 1122: Match the task with one of the five phases. troublesshooting answer: Manufacturing 1123. What is gross profit? answer: what the company earms before deducting all cots 1124: Choose the best option to replace the word in italic. Email is seen as less intrusive than other forms of communication. answer: personal

1125. What is e-commerce answer: selling using internet technology 1126: She told me that ______________ as well as an actress needs a lot of time and money. answer: Being a musician 1127: What are routine tasks? answer: ordinary work 1128: What do auditors do? answer: they check a company's financial documentation. 1129: When sending additional documents with an e-mail, which phrase is correct? answer: Please find attached. 1130: Which sentence is true? answer: Innovations can be risky. 1131. Which of the following is a definition of exclusivity? answer: holding a special position in the market 1132. Drivers welcomed the ______ gas prices. answer: falling 1133. What is infoglut? answer:food of finfomation 1134. What is distribution? answer: getting goods from the factory to the shop 1135. What is supply and demand? answer: the goods available for sale and the buyers for them 1136. What is another word for income? answer: revenue 1137. 'We're piloting the system'. which sentence has the same meaning? answer: We're trying out the system. 1138. Trading means ... answer: buying and selling. 1139. Which of the following does not mean recruiting new personnel? answer: dismissing 1140. When you buy in bulk you can obtain _______ or rebates. answer: discounts 1141. Could you please ... as soon as possible? answer: call me back 1142. Match the word to from word partnership. answer: versions 1143. Match the word with one of the following nouns. e-commerce answer: forum 1144. The car, which is ______ by Jonh, is a Ford. answer: owned 1145. Choose some for a position answer: assess 1146. We realize that we ______ just send com;uters to countries where there are no technology teachers. answer: should'nt 1147. Refusing to buy goods or services from a particular company or country is called... answer: a boycott 1148. What is a prototype? answer: a design for a new type of product 1149. Which part of a Curicilum Vitar (C.V.) gives infomation about your past wo rk record? answer: Experience 1150. What are subsidies answer: sums of government money used to support individual producers countries 1151. His purpose might be either to get a raise or _______________ promotion. answer: request 1152. The applicants ______ are successful will hear within two weeks.

answer: that 1153. Which in the odd one in each set? answer: access Question 1 In the RDT 2.0, what happen when the error occurs? Answer: The receiver sends NAK to the sender to warn the sender that there is er ror. Question 2 The default mode of HTTP 1.1 is ____ Answer: Persistent connection with pipelining. Question 3 What is the role of a host that can wait to receive a request and send back resp onses? Answer: Server, Peer Question 4 Which the following is the individual characteristic of switch? Answer: Examining incoming frame s MAC address, selectively forward frame to outgo ing links. Question 5 What field in the IP header changes when a datagram is forward by a simple route r? Answer: Destination IP address. Question 6 What is the framing method used in PPP? Answer: Byte stuffing. Question 7 In the TCP connection, how can the receiver let the sender know how much data it can receive? Answer: Tell the sender in the three way handshake process. Question 8 An process-to-process communication up to which layer? Answer: Transport Question 9 Which address is the broadcast address in the link layer? Answer: FF-FF-FF-FF-FF-FF Question 10 In Connectionless demultiplexing, the socket contains: Answer: Source port number, destination port number. Question 11 In order to create a TCP connection, the client have to send which flag to the s erver?

Answer: SYN Question 12 Setting what TCP flag bit will start a handshake to terminate a TCP connection: Answer: F Question 13 What type of routing algorithm that OSPF use? Answer: Shortest path Question 14 On the datagram network, the data can be sent from the source to the destination over: Answer: Ethernet on LAN and PPP on WAN only Question 15 POST method is used when: Answer: The receiver sends acknowledgement to the sender. Question 16 Which transport layer was first used for steaming media? Answer: UDP Question 17 The receiver window is found in Answer: all TCP headers Question 18 Suppose that Host A then sends two segments to Host B over a TCP connection(20, 40, 145). What are the sequence number in the second segment? Answer: 165 Question 19 The purpose of ICMP echo request and ICMP echo reply is to Answer: report errors. Question 20 How do packets make their way through packet-switched networks? Answer: When a packet arrives at a router, the router examines the packet s destin ation address and forwards the packet according to the routing table. Question 21 The physical medium used in the Ethernet cable that comes in to your PC is Answer: Coax Question 22 Which of the following access methods is associated with Ethernet networks? Answer: CSMA/CD

Question 23 What happen when the Web server and the Web browser use persistent HTTP to trans mit data? Answer: Many objects can be sent over a TCP connection Question 24 What type of DNS Server has the IP addresses of all names in the Autonomous? Answer: local Question 25 Your normal PC requests a DNS to do a ____ search: Answer: recursive Question 26 How many duplicate ack-numbers trigger the Fast Retransmission mode? Answer: No, retransmissions are triggered by timeout event Question 27 CSMA/CD is used on: Answer: Wired network Question 28 In virtual circuit network, which information is used to identify the path betwe en the source and the destination? Answer: All of the answers Question 29 Which of the following IP addresses belongs to the network 100.10.245.0/24? Answer: 100.10.245.1 Question 30 Which IP address below belongs to the same network with 172.168.16.16/20? Answer: 172.168.16.1 Question 31 Which service belongs to the data link layer? Answer: Error correction Question 32 What can be used to identify the process? Answer: Both IP address of the host running that process and the port associated with that process. Question 33 The HTTP request line contains a ____ method to request a document from the serv er. Answer: GET Question 34

Why instant messaging application is hybrid of client/server and peer to peer? Answer: It needs a centralized server to keep user accounts details and allows e ach client contacts with others. Question 35 The client's and the server's functions are used in: Answer: Client/Server model and Peer to peer model. Question 36 Which of the following is characteristic of packet switching? Answer: Different paths possible. Question 37 Suppose that Host A then sends two segment to Host B over a TCP connection (20, 40, 145). What is the acknowledgment number? Answer: 125 Question 38 Traceroute (tracert in windows) sends ____ Answer: ICMP messages. Question 39 If the fragment offset has a value of 100 and MF = 0, it means that ____. Answer: the datagram has not been fragmented. Question 40 A switch processes up to which layer? Answer: Link Question 41 What is the name of the packets processed at the network layer? Answer: Datagram. Question 42 Why denial of service is dangerous? Answer: It prevents using network resources. Question 43 In the RDP 2.2, what happen when the error occurs? Answer: The receiver sends duplicate ACKs to the sender to warn the sender that there is error Question 44 What is information in IP header used to route packet in router? Answer: Destination Address, Source Address, and Protocol fields Question 45 What is the MAC protocol used in 802.11 network?

Answer: CSMA/CA Question 46 What is the one's compliment 8-bit checksum of the following 8-bit binary number s: 1001 0101 and 1010 1010 Answer: 1011 1111 Question 47 What happen when the Web server and the Web browser use nonpersistent HTTP to tr ansmit data? Answer: Only one object can be sent over a TCP connection Question 48 How does the HTTP protocol implement caching? Answer: Using cookie Question 49 Which of the followings is the function of the network layer? Answer: Forwarding packet Question 50 With the following Manchester encoding, the bit stream transmitted is Answer: 11010011 Question 51 What is the protocol used to obtain email from to an email server: Answer: SMTP Question 52 Which of the following describe the DHCP Discover message? Answer: It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. Question 53 What begins an Ethernet frame? Answer: Length Question 54 Which of the followings is the datagram network? Answer: IP Question 55 In the resource records of DNS, which record is also known as an alias hostname? Answer: CNAME record Question 56 CSMA/CA is used on: Answer: IEEE 802.11 network

Question 57 What is the reason that UDP is best effort data delivery protocol? Answer: All of the answers. Question 58 The OSI layer responsible for interpret meaning of data,e.g., encryption, compre ssion, machinve-specific conventions is the Answer: presentation layer. Question 59 FDM and TDM are used in Answer: circuit switching Question 60 Which of these is example of G2C? Answer: Government distributing tax forms electronically. Question 61 Where does a hub send data? Answer: To all the systems connected to the hub. Question 62 Your company's network is on several floors of a building...? Answer: None of .... WLAN. Question 63 What uniquely indentifies every NIC? Answer: Media access control address (MAC address). Question 64 What Windows utility do you use to find the MAC address for a system? Answer: IPCONFIG. Question 65 you are told you need to build a network utilizing IEEE 802.11 standard? Answer: Wireless in infrastrucre mode. Question 66 Ad-hoc network is? Answer: a temporary network formed by communicating stations or computers in a w ireless LAN. Question 67 Which layer in the TCP/IP stack is equivalent to the transport layer of the OSI model? Answer: none of (transport).

Question 68 Arrange the following protocol layer Answer: application>session->transport->network->data link. Question 69 Byte stuffing means adding a special byte to the data sestion of the frame when there is a character with the same patter as the flag. We add r redundant bits to each block to make the length n=k+r.The resulting n-b it blocks are called? Answer: datawords. Question 70 When CRC is calculated,the divisor in a cyclic code is ... Answer: called the redundancy. Question 71 The pad field in Ethernet frame format used to? Answer: ensure the minimum size of frame. Question 72 A frame ends with a special bit called the cyclic redundancy check(CRC).What doe s the CRC do? Answer: Verifies that the data arrived correctly. Question 73 When PPP connections are started, the links go through three phases of session a stablishment? Answer: Authentication phase+Network layer protocol phase+Link establishment Question 74 Which of the following best describes the main function of OSI layer 2(link) pro tocol? Answer: Framing. Question 75 What cable type used for an Ethernet segment length more than 2000m 10-100Mbps? Answer: Fiber optics. Question 76 The Maximum number of data flowed through in N-port switch(LAN switch L2)? Answer: N-1 Question 77 What begins an Ethernet frame? Answer: cyclic redundancy check-a frame check sequence Question 78 A MAC address is known as a ..______.. address.

Answer: physical Question 79 This connector(____) is used for 10Base-T Answer: RJ45 Question 80 Which devices are the layer 2-device? Answer: Hub, switch Question 81 Which of the following routing algorithms are used in IP networks? Answer: Linkstate, Distance Vector, Hierarchical routing. Question 82 What is the data unit used in internet protocol(IP)? Answer: packet Question 83 Which field in the IP header is used to prevent an IP packet from continuously l ooping? Answer: TTL(time to live) Question 84 What is the protocol used to assign IP address to PCs in Lan automatically? Answer: DHCP Question 85 In error reporting the encapsulated ICMP packet goes to the original sender the source Answer:ICMP network 8 byte hearder and a variable data Question 86 DHCP discover message? Answer: It use FF:FF:FF:FF:FF:FF as a layer 2 broadcast, It use UDP as the Trans port layer protocol Question 87 Network layer does not provide reliable transmission because Answer:there is no acknowledgment process in the network layer Question 88 Because the sendin and the receiving processes may not write or read data at the same speed TCP...? Answer: uses buffers Question 89 What is the optional service that the UDP protocol provides?

Answer: error detection Question 90 which protocol is better for real-time video application over the interget? Answer: RTP real-time transport protocol Question 91 The advantage of UDP is Answer: data moves faster. Question 92 which of the following protocols use both TCP and UDP Answer: is DNS Question 93 which of the following services use UDP Answer: DHCP,SNMP,TFTP use UDP. Question 94 which of the following services use TCP Answer: SMTP,FTP,HTTP use TCP Question 94 This command identifies the sender of the message? Answer: Mail Question 95 The ----domains define registered hosts according to their generic behavior Answer: generic Question 96 In ----resolution, the resolver expects the DNS server to supply the final answe r Answer: recursive Question 97 In ____iterative______ resolution, the server returns the IP address of the serv er that it thinks can resolve the query. Answer: iterative Question 98 Audio/video refers to the broadcasting of radio and tv programs through the inte rhet? Answer: streaming live Question 99 In an e-mail service system,the purpose of MTA is Answer: transferal of message across the internet

Question 100 Which type of DSN record is used by mail servers to determine where to send e-ma il? Answer: MX record Question 101 what is the purpose of a hash algorithm?(choose 2) Answer: To encryt short phrases + To create a secure checksum Question 102 You have downloaded a CD ISO image and want to verify its integrity? Answer:Create an MD% sum and compare it ro the MD5 sum listed wherethe image was downloaded. Question 103 To secure your e-mail message,you can use Answer: IMAP Question 104 IPSec is made up of two basic security protocol Answer: the Authentication Header (AH) and the Encapsulating Security Payload (E SP) Question 105 What is the minimum number of cryptographic keys required for recure two-way com munications in asymmetric key? Answer: 4 Question 106 ___ is a standards-based mechanism for providing encryption for poit-to-poit TCP ? Answer: IP traffic Question 107 _____ not a benefit of NAT Answer: The loss of end-to-end IP + Additional load + Some programs cannot work Question 108 which of the following programming languages is least prone to the insertion? Answer: JavaScript Question 109 2 methods of circuit switching of diciding bandwidth? Answer: FDM and TDM Question 110 Denial of service (DoS) attack? Answer: Attackers make network resources unavailable by overwhelming.... Question 110

CSMA/CD for a 10Mbps Ethernet..? Answer: either 0 or 512 microseconds Question 111 which of the following is hybrid of client-server and p2p? Answer: skype Question 112 Traceroute commands uses? Answer: ICMP Question 113 The DNS protocol runs Answer: over UDP and uses port 53 Question 114 connects directly to wire? Answer: Physical Question 115 In TCP, what can happen if the timeout is smaller than the connection's round trip time Answer: unnecessary retransmissions Question 116 TCP segment has Answer: 20 byte header Question 117 UDP segment has Answer: 8 byte header Question 118 POP: Answer: Post Office Protocol Question 119 IMAP: Answer:Internet Mail Access Protocol [RFC 1730] Question 120 HTTP: Answer:gmail, Hotmail, Yahoo! Mail, etc. Question 121 ___ is designed to allow users to manipulate remote mailboxes, so it is more int eresting than POP3 Answer: IMAP

Question 122 IP address+port= Answer: socket Question 123 two-dimensional parity Answer: Detect and correct single bit errors Question 124 The purpose of ICMP echo request and ICMD echo reply message is to Answer: report errors Question 125 P2P network: Answer: A user computer can be both client and server Question 126 In the PPP frame,defines the contents of the data field? Answer: Flag Question 127 FTP identification and password Answer: port 21 Question 128 FTP data file Answer: port 20 Question 129 UDP segment header: Answer: source port,checksum,length,Destination port Question 130 In TCP congestion control 2 important variables has to keep track: Answer: Congestion windown and threshold Question 131 The MAC protocol: Answer:slotted ALOHA,ALOHA,CSMA, CSMA/CD, CSMA/CA Question 132 core of the internet consist of: Answer: routers Question 133 Main reason of packet loss in the internet is:

Answer: Routers drop packets because their buffers are full. Question 134 delay mainly depends on the congestion of the network? Answer: Queueing delay. Question 135 throughput of a link? Answer: Number of bits travelling through link in a unit time. Question 136 IP fragmentation a datagram is fragmented into two packets: Answer: offset=0 and FragFlag=0. Question 137 router: Answer: Earch interface to have a unique IP address Question 138 Generic router architecture: Answer:output port,input port, routing processors,switching fabric Question 139 The ____ is the physical path over a message travels. Answer: Medium Question 140 The information to be communicated in a data communications system is the Answer: Message Question 141 Frequency of failure and network recovery time after a failure are measures of t he of a network. Answer: Reliability Question 142 A connection provides a dedicated link between two devices. Answer: point-to-point Question 143 refers to the physical or logical arrangement of a network. Answer: Topology Question 144 A is a data communication system within a building,plant,or campus,or between nearby buildings. Answer: LAN .

Question 145 is a collection of many separate networks. Answer: An internet Question 146 is an idea or concept that is a precursor to an Internet standard. Answer: RFC Question 147 In the OSI model,as a data packet moves from the lower to the upper layers, head ers are Answer: removed Question 148 In the OSI model,when data is transmitted from device A to decide B,the header f rom A's layer 5 is read by B's layer. Answer: session Question 149 HDLC is an acronym for . Answer: High-level data link control Question 150 Data link control deals with the design and procedures for Answer: no-to-no,ho-to-ho,de-to-de Question 151 in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. Answer: Framing Question 152 In framing,there is no need for defining the boundaries of frames. Answer: Fixed-size Question 153 Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the . Answer: flag Question 154 In cyclic redundancy checking,what is the CRC? Answer: The remainder Question 155 The most common protocol for point-to-point access is the Point-to-Point Protoco l(PPP),which is a protocol. Answer: byte-oriented. .

Question 156 High-level Data Link Control(HDLC) is a -to-point and mutipoint links. Answer: bit-oriented Question 157 control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Question 158 In PPP,the is responsible for establishing,maintaining,configuring,and termina ting links. Answer: LCP Question 159 Thick Ethernet can be extended to Answer: 500 Question 160 This is what happens if two devices on the same Ethernet network determine the n etwork is free,but attempt to transmit data at exactly the same time. Answer: collision Question 161 How "big" is an IPv6 Internet address? Answer: 128bits Question 162 What is the main objective of the IPv6 proposal to the TCP/IP protocol suite? Answer: allow for more Internet addresses Question 163 What is the size,in bits,of the Net_ID field in a Class B Internet address? Answer: fourteen bits Question 164 What does the "time-to-live" field(8 bits) do in an IP header? Answer: prevents infinite looping Question 165 Which option is not IP options? Answer: Quality of service Question 166 When a datagram is encapsulated in a frame,the total size of the datagram must b e less than the . Answer: MTU meters per segment. protocol for communication over point

Question 167 If the fragment offset has a value of 100 and MF = 1,it means that Answer: the first byte of the datagram is byte 800 Question 168 A datagram is fragmented into three smaller datagrams.Which of the following is true? Answer: The identificaiton field is the same for all three datagrams Question 169 In IP Header,IHL field value of decimal 10 means Answer: there are 40 bytes in the header Question 170 What is the first address of a block of classless addresses if one of the addres ses is 12.2.2.127/28? Answer: 12.2.2.112 Question 171 control regulates the amount of data a source can send before receiving an a cknowledgment from the destination. Answer: Flow Question 172 A TCP segment is encapsulated in Answer: an IP datagram Question 173 In TCP,the value of the acknowledgment field in a segment defines the number of the byte a party expects to receive. Answer: next Question 174 Communication in TCP is Answer: full-duplex Question 175 TCP assigns a sequence number to each segment that is being sent.The sequence nu mber for each segment is the numbet of the byte carried in that segment Answer: first Question 176 Connection establishment in TCP is called Answer: three-way Question 177 In TCP,Nagle's algorithm can solve the silly window syndrome created by the . Answer: sender handshaking. . . . .

Question 178 In TCP,Clark's solution can solve the silly window syndrome created by the . Answer: receiver Question 179 TCP allows the sending process to deliver data as a eceiving process to obtain data as a of bytes. Answer: stream,stream of bytes and allows the r

Question 180 In RTP, are used to number the packets of a real-time transmission. Answer: Sequence numbers Question 181 The file linked to the song title is not the actual music file. Instead, it is w hat is called Answer: metafile Question 182 In the H.323 protocal stack, the protocol ___ is needed to allow the terminals t o negotiate which one they are going to use Answer: RTCP Question 183 The error introduced by the finite number of bits per sample is called Answer: quantization noise Question 184 ____ is an application protocol that establishes, manages, and terminates a mult imedia session Answer: SIP Question 185 ____ is a standard to allow telephones on the public telephone network to talk t o computers connected to the Internet Answer: H.323 Question 186 An HTTP request message always contains Answer: a request line and a header Question 187 In HTTP, the first line in a request message is called a ___ line; the first lin e in the response message is called ___ line. Answer: request , status Question 188 A cookie is made by the ___ and eaten by the ___

Answer: server , server Question 189 ___ is a technology that creates and handles dynamic documents. Answer: CGI Question 190 ___ is a repository of information linked together from points all over the worl d. Answer: The WWW Why NAT (Network Address Translation) is used? Answer: All of them In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byt e datagram is fragmented into _______ datagram(s) Answer: 2 Traceroute command uses Answer: ICMP RIP (Routing Information Protocol) in the Internet uses Answer: Distance vector routing algorithm Routers operate in the _______ layers. Answer: network Dijkstra s algorithm is Answer: A link-state routing algorithm Distance vector routing algorithm requires Answer: all nodes to know link costs to their neighbours In CRC, if the generator is x^4+x+1, then which one is added in to the frame bef ore the dividing process to find the remainder Answer: 0000 ______ is (are) (an) example(s) of random access MAC Answer: All of them In cyclic redundancy checking, what is CRC(cyclic redundancy check) Answer: the remainder ________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol Answer: Wireless LAN What is store-and-forward operation in switches? Answer: They receive the whole frame before forwarding to next station ______is used in Ethernet Answer: CSMA/CD Which one is the flag used for framing in PPP Answer: 01111110 Which one can be a MAC address? Answer: 00-D0-56-F2-B5-12 ARP stands for _________ Answer: Address Resolution Protocol Parity checking _____. Answer: can detect a single bit error in a transmission 1. At the CRC generate, ___ added the data unit before division process. Answer: 0s are 2. What type of routing algorithm that OSPF use? Answer: Shortest Path Routing 3. The bytes of data being transferred in each connection are numbered by T CP. The number starts with a Answer: randomly generated number 4. The ___ model shows how the network functions of a computer ought to be

organized. Answer: OSI 5. ___ audio/video refers to on-demand request for compressed audio/video f iles. Answer: Streaming live 6. The physical layer is concerned with the movement of ___ over the physic al medium. Answer: bits 7. What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 8. If ASCII character H is sent and the character I is received, what type of errors is this? Answer: multiple-bit 9. HDLC is a ___ protocol Answer: bit-oriented 10. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is un compressed. How long does it take to transmit it over a 1-Mbps cable modem? Answer: 18874 sec 11. What flag is used to close TCP connection? Answer: FIN 12. What type of routing protocol that BGP is? Answer: Distance Vector Routing 13. A bridge has access to the ___ address of a station on the same network. Answer: none is correct 14. The ___ layer is responsible for the delivery of a message form one proc ess to another. Answer: none is correct 15. With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 16. Routers function in the ___ layers. Answer: physical, data link, and network 17. The purpose of MTA is Answer: Transferal of message across the Internet 18. A ___ document is created by a Web server whenever a browser requests th e document Answer: Active 19. What type of service that VC network provides? Answer: Connection-oriented 20. A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps chan nel that has a 4-msec one-way delay. What is the line efficency? Answer: 6.5%

21. ___ is more powerful and complex than ___ Answer: IMAP4; POP3 22. TCP allows the sending process to deliver data as a ___ of bytes and all ows the receiving process to obtain data as a ___ of bytes. Answer: stream; stream 23. TCP uses ___ to check the safe and sound arrival of data. Answer: an acknowledgment mechanism 24. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are___ Answer: removed 25. Which IP option is used if exactly four specific router are to be visite d by the datagram? Answer: strict source route 26. What is the service that the UDP protocol provides? Answer: guaranteed delivery 27. In the OSI model, encryption and decryption are function of the ___ laye r. Answer: presentation 28. Which device can amplify and make free- noise signal to all computer in LAN? Answer: all three devices 29. What is information used to route packet in network? Answer: destination address and source address fields in IP header 30. Because the sending and the receiving processes may not write or read da ta at the same speed. TCP ___ Answer: uses buffers 31. ___ specifies a physical star topology featuring a central hub and twist ed-pair cable as the medium. a. 10BASE-T b. 10BASE5 c. 10BASE2 d. None is correct 32. The difference between TCP and UDP is primarily Answer: one is connection-oriented, one is connectionless 33. In classless addressing, ___ is assigned to an organization. Answer: a fixed number of blocks 34. In ___ resolution, the resolver expects the server to supply the final a nswer. Answer: recursive 35. By default, FTP uses which ports? Answer: 80 and 8080 Quiz Chapter1 1. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 2. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 3. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits 4. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 5. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 6. MAN stands for?

Answer: Metropolitan Area Network 7. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 8. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 9. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 10. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation Quiz Chapter3 1. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 2. At the CRC generate, added the data unit before division process. Answer: 0s are 3. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 4. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 5. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 6. HDLC is a________protocol Answer: Bit-oriented 7. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 8. In cyclic redundancy checking, what is CRC Answer: The remainder 9. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 10. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 1. Maximun of data flow through in N-port switch (an with L2) Answer: N 2. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 3. Repeaters function in the layer Answer: Physical 4. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 5. What network device decreases collision switch Answer: Transceiver 6. _____specifies a physical star topology central hub . Answer: Twisted-pair 1. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically?

Answer: DHCP 2. What is information used to route packet in network? Answer: Destination Address fields in IP header 3. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 4. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 5. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 6. IP is________datagram protocol Answer: Both a and b 7. In classless addressing,_______is assigned to an organization. Answer: A variable-length block 8. Which layer does ICMP reside in? Answer: Physical 9. DHCP is used to: Answer: Assign IP addresses automatically 10. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask 14 The number of addresses assigned to an organization in classless address ing _______. Answer: must be a power of 2 15 The first address assigned to an organization in classless addressing __ _____. Answer: must be evenly divisible by the number of addresses 16 Which address could be the beginning address of a block of 32 classless addresses? Answer: 2.4.6.64 17 Which address could be the beginning address of a block of 16 classless addresses? Answer: none of the above 18 Which address could be the beginning address of a block of 256 classless addresses? Answer: 2.4.6.0 19. What type of routing protocol that BGP is? Answer: Distance Vector Routing

1. Answer: 2. Answer: 3. Answer:

What is the data unit used in TCP? Segment What is the service that the UDP protocol provides? Guaranteed delivery What flag is used to close TCP connection? FIN

4. Because the sending and the receiving processes may not write or read da ta at the same speed, TCP______ Answer: Uses buffers 5. The difference between TCP and UDP is primarily Answer: One is connection-oriented, one is connectionless 6. TCP allows the sending process to deliver data as a_____of bytes and all ows the receiving process to obtain data as a_____of bytes. Answer: Stream; stream 7. TCP uses______________to check the safe and sound arrival of data. Answer: An acknowledgment mechanism 8. TCP is a (n)__________transport protocol. Answer: Reliable 9. What is the combination of an IP address and a port number called? Answer: A socket 10. The bytes of data being transferred in each connection are numbered by T CP. The numbering starts with a Answer: Randomly generated number 1. ______is used to compress video. Answer: JPEG 2. According to the Nyquist theorem, we need to sample an analog signal____ __times the highest frequency. Answer: Two 3. ______is more powerful and complex than______. Answer: IMAP4; POP3 4. What does the URL need to acess a document Answer: All are correct 5. The purpose of MTA is Answer: Transferal of message across the Internet 6. A_____document is created by a Web server whenever a browser requests th e document. Answer: Static 7. With WWW as an example of client-server computer software, the server is : Answer: The machine that makes WWW document available 8. _____audio/video refers to on-demand requests for compressed audio/video files. Answer: Streaming stored 9. In______resolution, the resolver expects the server to supply the final answer. Answer: Recursive 10. By default, FTP uses which ports? Answer: 20 and 21 11 . Currently two message access protocols are available:_____ and_____. Answer: POP3; IMAP4 12 With WWW as an example of client-server computer software, the client is : Answer: The machine that you use to display WWW documents 11. Which agency developed standards for physical connection interfaces and electronic signaling speccifications? Answer: EIA 12. In the OSI model, which layer functions as a liaison between user suppor t layers and network support layers? Answer: Transport layer 13. The Physical layer is connected with the movement of____over the physica l medium. Answer: Bits

14. Which of the following statement is correct? Answer: Full-Duplex: Communications in which both sender and receiver can send a t the same time 15. What is the purpose of the IEEE 802 commitlee? Answer: To develop LAN standards 16. In the OSI model, as a data packet moves from the lower to the upper lay ers, headers are____ Answer: Removed 17. Which of the following is an appropriate description concerning B2C? Answer: Ordering books online 18. Which of the following is an appropriate description concerning mobile n etwork users? Answer: A notebook computer used in a class 19. In the OSI model, encryption and decryption are functions of the_____lay er. Answer: Presentation 11. If ASCII character G is sent and the character D is received, what type of error is this? Answer: Burst 12. At the CRC generate, added the data unit before division process. Answer: 0s are 13. According to the PPP transition state datagram, exchange of user control and data packets occurs in the state Answer: Establishing 14. According to the PPP transition state datagram, verification of user ide ntification occurs in the state Answer: Authenticating 15. At the CRC checker,______if the data unit is damaged. Answer: A nonzero remainder 16. HDLC is a________protocol Answer: Bit-oriented 17. If ASCII character H is sent and the character I is received, what type of error is this? Answer: Single-bit 18. In cyclic redundancy checking, what is CRC Answer: The remainder 19. In sliding window flow control, if the size is 63, what the range sequen ce numbers? Answer: 0 to 63 20. What is present in the HDLC control fiels for I-frame Answer: All are correct 11. G At the CRC generate, ___ added the data unit before division process . Answer: 0s are 7. Maximun of data flow through in N-port switch (an with L2) Answer: N 8. How many collision domains has the computer with 88 computers, 10hubs an d 2 repeaters? Answer: 1 9. Repeaters function in the layer Answer: Physical 10. Which cable type used for segment lenth more than 2000m. Answer: Fiber optics 11. What network device decreases collision switch Answer: Transceiver 12. _____specifies a physical star topology central hub . Answer: Twisted-pair

11. What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically? Answer: DHCP 12. What is information used to route packet in network? Answer: Destination Address fields in IP header 13. What type of routing algorithm that OSPF use?--------------------------Answer: Shortest Path Routing 14. What does the IP header s protocol field identify? Answer: The transport layer protocol that generated the information in the data field 15. What is the IP address used to test a PC s network card that don t need conn ect PC to another PC? Answer: All are correct 16. IP is________datagram protocol Answer: Both a and b 17. In classless addressing,_______is assigned to an organization. Answer: A variable-length block------------------------------------18. Which layer does ICMP reside in? Answer: Physical 19. DHCP is used to: Answer: Assign IP addresses automatically 20. What is protocol used to inform errors concerning IP?----------------------------Answer: ICMP 11. In classless addressing, the ______ is another name for the comm on part of the address range. Answer: prefix 12 In classless addressing, the _______ is the varying part (simila r to the hostid). This is the correct answer. Answer: suffix 13 In classless addressing, the prefix length defines the _____________. Answer: mask What is a VLAN used to create? Answer: #Broadcast domains What is an effective preventative measure used with segmentation to prevent broa dcast related problems? Answer: #Firewalls What would be the preferred type of link of a VLAN backbone? Answer: #High bandwidth What is the term used when ports on a switch are administratively assigned to a VLAN? Answer: #Dynamic A VLAN is based on which type of grouping? Answer: #Logical How can access be controlled on a secured VLAN? Answer: #All of the above Which technique examines particular information about each frame? Answer: #Frame filtering Dynamic VLANs can be based on which of the following? Answer: #All of the above Frame tagging functions at what OSI layer? Answer: #2 Which of the following do VLANs use to make filtering and forwarding decisions? Answer: #Frames The smaller the VLAN, the smaller the number of users that are affected by which of the following?

Answer: #Broadcasts What technique does 802.1q use to implement VLANs? Answer: #Frame tagging What is a benefit of using VLANs? Answer: #Tighter network security When logically segmenting your network with VLANs, what type of device do you ne ed to ensure proper communication between the VLANs that are created? Answer: #Router Which of the following VLAN types require changes by the network administrator b ut are easy to configure, and straightforward to monitor? Answer: #Static Frame tagging places a unique identifier in the header of each frame as it is fo rwarded across the network __________. Answer: #backbone Which of the following results in network microsegmentation? Answer: #Using switches for connectivity Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch The star/extended star topology uses what type of standard? Answer: #Ethernet 802.3 What is the ability to expand the network without having to perform any major ch anges to the overall design? Answer: #Scalability Which of the following is NOT a factor when configuring an intranet? Answer: #Providing public access Where should workgroup servers be placed? Answer: #IDF Internetwork design seeks to provide the greatest availability for the least ___ ______. Answer: #cost Which of the following is NOT a step in gathering and analyzing requirements for a LAN? Answer: #Develop LAN topology Which of the following is NOT true about logical and physical network maps? Answer: #Show which routing protocol is used Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following results from the use of bridges and switches for segmenta tion? Answer: #Multiple collision domains What is the most important Layer 1 issue to consider when designing a network? Answer: #Physical cable plan What is the current standard for the bandwidth connecting MDF to IDF in Mbps? Answer: #100 What is the first step in LAN design? Answer: #Establish the design goals In a pure LAN switch environment, what is the size of the collision domain? Answer: #Two hosts What can routers provide when used between VLANs? Answer: #Communication Which of the following is allowed by asymmetric switching? Answer: #Connections of unlike bandwidth What do VLANs provide? Answer: #Broadcast containment Which of the following devices is associated with one broadcast domain per port? Answer: #Router What type of network segmentation do routers allow? Answer: #Logical and Physical When creating multiple wiring closets in a totally switched environment, what el

se is always created? Answer: #Multiple catchment areas What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports? Answer: #6 m What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is used to create multiple physical networks in a structured Layer 1 wiring scheme? Answer: #Patching the horizontal and vertical cabling into an appropiate layer 2 switch Which OSI layer is responsible for finding the best path through the internetwor k? Answer: #3 What is a router's main responsibility when routing packets? Answer: #Path determination What do routers use to make forwarding decisions? Answer: #Routing tables Which of the following refers to the number of routers a packet must pass throug h? Answer: #Hop count What two parts can most protocol addressing schemes be broken down into? Answer: #Network and host What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function What do routers use to communicate with other routers? Answer: #Routing protocols Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes Distance-vector routing begins by identifying which directly connected entity? Answer: #Networks Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocols Which of the following are primary goals of routing protocols? Answer: #2, 3, 4 What causes routing loops? Answer: #Routing tables have not converged What type of information is automatically adjusted as topology changes occur? Answer: # Dynamic routes What does dynamic routing rely on? Answer: #Accurate routing tables For dynamic routing to work properly what must routers send to other routers? Answer: #Timely updates Which of the following is another term for shortest path first routing algorithm ? Answer: #Link state Which of the options below gives two basic steps required when configuring a rou ting protocol? Answer: #2, 4 What passes periodic copies of routing tables from router to router? Answer: #Distance vector Which of the following is a Cisco proprietary protocol? Answer: #IGRP Routers under a common administration are said to belong to what? Answer: #An AS Select the correct IOS command for configuring IGRP as the routing protocol. Answer: #Router(config)#router igrp 100 At what time interval does IGRP send routing updates?

Answer: #90 seconds What is the maximum hop count associated with IGRP? Answer: #255 Which of the following must be configured on a router in order to deny packets b ased on specific tests? Answer: #Access lists When using a standard access list, which of the following criteria can routers u se for filtering packets? Answer: #Source address Which type of access list uses the number range 100-199? Answer: #IP extended A wildcard mask bit of "1" means that the corresponding bit must be ___________. Answer: #ignored Which order are the statements in an access list processed to determine whether packets should be processed or discarded? Answer: #In sequential order What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. What is the final step in implementing an access list? Answer: #Apply the access list to one or more interfaces. What type of access list would you use to permit or deny specific protocols with in the IP suite? Answer: #Extended IP access lists use which of the following to determine which address bits are e xamined? Answer: #Wildcard bits Which wildcard mask would match the host range for the subnet 192.16.5.32 /27? Answer: #0.0.0.31 What would the wildcard mask be to deny traffic only on network 195.67.52.0? Answer: #0.0.0.255 In an access list, what word can replace 0.0.0.0 255.255.255.255? Answer: #Any Which type of access list would permit or deny part of a protocol suite? Answer: #Extended Which command is used to keep track of how many packets were permitted or denied based on an access-list? Answer: #log Along with the packet type, Cisco IOS access lists also check what? Answer: #Upper layer headers What is a possible use of ACLs? Answer: #Packet filtering Which port number is used for DNS? Answer: #53 Which ACL would permit everyone to telnet to router 192.168.5.2? Answer: #router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23 Where should standard access lists be set? Answer: #Close to the destination Access lists can be applied to traffic flowing in which direction? Answer: #Both inbound and outbound Which Cisco IOS command allows you to view the placement of an access list? Answer: #show ip interface How do you obtain an IPX network address? Answer: #Obtain it from the network administrator Which frame types are compatible with the Cisco IOS name Novell-ether? Answer: #Ethernet_802.3 Which command is used to display IPX routing tables? Answer: #show ipx route When using multiple encapsulations on an interface, what must be assigned? Answer: #Multiple network numbers Which of the following commands enables IPX routing?

Answer: #ipx routing What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP What do NetWare clients use to find NetWare servers? Answer: #SAP packets What do routers do with SAP packets? Answer: #Build a SAP table Where does the response to a GNS request come from if there is both a Cisco rout er and a NetWare server on the same LAN? Answer: #Local NetWare server When configuring interfaces for IPX, what must be assigned to each interface? Answer: #Network number What is the default WAN tick metric for IPX networks? Answer: #Six Which Cisco IOS command is used to check IPX SAP updates? Answer: #debug ipx sap activity Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Where are SAP tables stored? Answer: #On routers and servers What type of protocol is IPX? Answer: #Connectionless Why would you use the command IPX maximum-paths? Answer: #To provide load sharing What does IPX use in the host portion of an address to eliminate the use of ARP requests? Answer: #MAC What is correct regarding the node number using Novell's IPX addressing scheme? Answer: #Same as the MAC address Select the command that you would use to check IPX routing updates. Answer: #debug ipx routing activity Which of the following occurs when a router running Novell RIP has two equal pat hs to a network? Answer: #Implements load sharing Which metrics does Novell RIP use? Answer: #Ticks and hop count What is the default type of routing protocol used by Novell NetWare? Answer: #Distance vector Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic A peer-to-peer network is also known as what type of network? Answer: #Workgroup Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks? Answer: #RAID 5 Which of the following would NOT be found on security documentation? Answer: #Software listings Which command will test the loopback function on the NIC? Answer: #Ping 127.0.0.1 Which device controls voltage spikes and HF noise? Answer: #Isolating transformer Which of the following is NOT associated with a peer-to-peer network? Answer: No additional software is required Which of the following is used to keep a list of equipment repairs? Answer: #Maintenance record Which of the following reports would be used to determine what programs are inst alled on a particular computer?

Answer: #Software Which of the following is the most critical component of good network administra tion? Answer: #Documentation What is the least implemented component of network administration? Answer: #Documentation What is a solution to the problem of EMI/RFI effecting performance on your netwo rk? Answer: #Using STP cable What is the reason magnetic tape is used to backup data? Answer: #Cost Which of the following is a program that spreads across computers and usually re produces copies of itself in a computer's memory? Answer: #Worm Which of the following is NOT used as a baseline measure? Answer: #Configuration errors Network troubleshooting is defined as what type of process? Answer: #A systematic process Which of the following is a program that usually has a negative effect on execut able programs? Answer: #Virus What criteria should be used to select network passwords? Answer: #Network policy What controls the resources and management of a client-server network? Answer: #Network operating system (NOS) Which of the following is included in MDF and IDF documentation? Answer: #Rack mount locations Which of the following refers to documentation that outlines what is and what is not permissible on the network? Answer: #User policies Risks associated with working on the inside of a computer can be reduced by doin g which of the following? Answer: #Using a grounding strap What is the recommended maximum number of users in a peer-to-peer network? Answer: #10 How is communication provided between VLANs? Answer: #Layer 3 routing The star/extended star topology uses which standard? Answer: #Ethernet 802.3 Which configuration command is used to set the number of routes used for load sh aring? Answer: #ipx maximum-paths Which type of back up operation backs up all files on the disk and sets the arch ive bit on all files to off? Answer: #Full backup What happens to a packet that does not match any of the tests in an access list? Answer: #It is discarded. A wildcard mask bit of "0" means that the corresponding bit must be _________. Answer: #matched Select the correct pairing of a Spanning Tree Protocol state with its functional description: Answer: #Listening - no frames forwarded, listening for frames Which routing protocol maintains a complex database of topology information and uses link-state advertisements (LSAs)? Answer: #OSPF How can a router learn a path to a destination? Answer: #Dynamic routing In an access list, which word can replace 0.0.0.0 255.255.255.255? Answer: #Any What is used by distance-vector routing protocols?

Answer: #Periodic updates of entire routing table What do routers use to forward packets between source and destination networks? Answer: #Routing table What do routers use to maintain tables? Answer: #Routing protocols Which statements are true when configuring a router to operate with RIP? Answer: #At the global configuration prompt issue the command "router rip." Then issue the "network" command at the config router prompt for each directly conne cted network. Select the prompt which will be displayed after issuing the router igrp 100 comm and. Answer: #Router(config)# Switches that receive the entire frame before sending it, use which type of fram e forwarding? Answer: #Store-and-forward Which frame type is the default for Novell version 2 through 3.11? Answer: #Ethernet_802.3 Which type of ACL only checks the source address? Answer: #Standard ACL Which of the following imposes boundaries on broadcast traffic? Answer: #Router Which IPX routing command is used to show the number and type of packets receive d and transmitted by the router? Answer: #show ipx traffic What allows a router to accept a packet on one interface and forward it to anoth er interface? Answer: #Switching function All of the following statements about VLANs are true EXCEPT: Answer: #VLANs are standardized. Which of the following devices establishes a bandwidth domain also known as the collision domain? Answer: #Switch At which layers of the OSI model do VLANs operate? Answer: #Data Link and Network Where should ACLs be applied if they are intended to provide security for the ne twork? Answer: #On border routers In which type of VLAN are all of the nodes connected to ports in the same VLAN a ssigned the same VLAN ID? Answer: #Port centric How is a frame tagged on a VLAN? Answer: #With a VLAN ID What is another term for latency? Answer: #Propagation delay What does the split horizon rule help prevent? Answer: #Routing loops Before a router forwards a packet, which address does it change? Answer: #Destination MAC address What is a benefit of using VLANs? Answer: #Tighter network security A switch segments a LAN into which of the following? Answer: #Microsegments Twenty users are evenly connected to two hubs, which are each connected to 10 Mb ps switch ports. What is the average bandwidth available per user? Answer: #1 Mbps Which of the following is the correct command to delete an access list? Answer: #Router(config)# no access-list list-number Which of the following is true regarding routing metrics? Answer: #Routers compare metrics to determine the best route. What is the recommended maximum number of users in a peer-to-peer network?

Answer: #10 Which protocol is used to allow redundant paths in a switched/bridged network? Answer: #Spanning Tree What is the effect of a switch on bandwidth? Answer: #Dedicates bandwidth What is the encapsulation type on a router for a Novell network running version 3.12? Answer: #SAP Identify the correct pairing of a protocol and its classification. Answer: #RIP-Interior Which of the following is a true statement regarding location of servers in a ne twork? Answer: #Workgroup servers should be in the appropriate IDF, while enterprise se rvers should be in the MDF. Which device is one of the most common Layer 2 devices? Answer: #LAN switch Which of the following RAID levels includes disk mirroring or disk duplexing? Answer: #RAID 1 Select the correct pairing of a network service with the class of server on whic h it is most likely to reside: Answer: #DNS - enterprise Which of the following devices allows communication between VLANs to occur? Answer: #router Which of the following will help alleviate congestion? Answer: #An increase in bandwidth Which condition best describes convergence? Answer: #When all routers in an internetwork have the same knowledge of the stru cture and topology of the internetwork Entries made by an administrator to manipulate a routing table are referred to a s which of the following? Answer: #Static routes What does a bridge use to build its address table? Answer: #Source MAC address Which of the following is true regarding latency? Answer: #Networking devices add to latency. Increasing the bandwidth of a LAN switch topology from 10 Mbps to 100Mbps would require which of the following? Answer: #A faster switch port Which routing protocol is used to communicate between autonomous systems? Answer: #Exterior routing protocol Where should extended access lists be placed? Answer: #Close to the source Which command verifies that a particular node is capable of responding to an IPX network request? Answer: #Ping 8. If Acme Inc. occupies the first three floors of a building and each flo or is 1500 square meters, how many wiring closets should be installed answer: six 8. What is the first step in locating a wiring closet for a network? answer: Identify on a floor plan, all devices that will be connected to the netw ork. 8. What kind of power disturbances can be caused by strikes? answer: surges 8. What network device is used in an extended star topology when the catchment a rea of one wiring closet is not enough? answer: repeatter 8. What is a common cause of oscillation often called harmonics? answer: excessively long electrical wiring runs 8. Why are common mode problems a hazard to you or your computer? answer: They go directly to the computer chassis.

8. Where should the main distribution facility (MDF) be located in a multi-story building using an extended star topology? answer: on one of the middle floors 8. What best describes the difference between alternating and direct current? answer: DC flows at a constant value, whereas AC rises and falls. 8. How does AC line noise create problems? answer: by adding unwanted voltage to the desired signals 8. What is the "one-hand rule?" answer: Only touch electrical devices with one hand at a time to prevent electri city from flowing through the body. 8. Which type of networking media is now installed most often for backbone cabli ng? answer: 62.5/125 micron fiber-optic cable 8.Which of the following is a source that can produce interference on UTP cable? answer: fluorescent lights 8. Why are split pairs a problem for network installations? answer: The wires are part of different circuits so signals are not protected an d cross-talk occurs. 8. When should cable not be routed in an existing raceway?if it already contains a power cable answer: if it already contains a power cable 8. What is the central junction for the network cable? answer: wiring closet 8. What should be used to mount cable to a wall? answer: tie wraps 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: IDFs 8. If you have one wiring closet and you want to add more, what name is given to additional wiring closets? answer: Wear baggy clothes. 8. What tool would you use to attach CAT5 cable to a patch panel? answer: punch tool 8. What is one advantage of using distribution racks for mounting patch panels? answer: allows easy access to both the front and back of the equipment 8. Why is the wiring sequence critical when RJ-45 jacks are used at the telecomm unications outlet in a horizontal cabling scheme? answer: For the network to function properly. 8. What is the most important thing to do before you work in walls, ceilings or attics? answer: Turn off power to the area. 8. What kind of jack must be used for making a connection to a Category 5 unshie lded twisted pair cable in a horizontal cabling scheme? answer: RJ-45 8.Why shouldn't you install a jack in the bottom five centimeters of a wooden ba seboard? answer: The bottom plate of the wall will prevent you from pushing the box 8. Which of the following describes a cable tester measurement of signal attenua tion? answer: It measures the reduction in power of a signal received from a signal in jector. 8. How is an RJ-45 jack surface mounted? answer: adhesive backed or screw box 8. What is the first thing you should do if near-end crosstalk is detected? answer: Visually check the horizontal cabling. 8.Which best describes a patch panel's function? answer: It acts as a switchboard where horizontal cabling from workstations can be connected to other devices to form a LAN. 8. How many pins are on each of the ports of a patch panel? answer: 8 pins

8. What should be done when preparing to run cable? answer:Label the boxes and cable. 8. What kind of a cable must you use when laying cable through spaces where air is circulated? answer: fire rated 8. How does a cable tester (a TDR) measure distance? answer: It times the signal sent towards and reflected back from the end of an o pen-ended cable 8. What type of raceway should be used if it will be visible in the room? answer: decorative 8. Why is establishing a baseline performance level for a network important? answer: for future periodic testing of the network and diagnostics 8.What is a rough diagram that shows where the cable runs are located called? answer: cut sheet 8. When running cable from the wiring closet to wall jacks, where is the cable i tself labeled? answer: at each end 8. What characteristic must hosts on a network possess in order to communicate d irectly ? answer:same network ID 8. Which of the following describes the effect of subnetting on the amount of br oadcast traffic? answer: decreases it, because broadcasts are not forwarded outside a subnet 8. Which of the following correctly describes an ISP? answer: Internet Service Provider 8.Which of the following is an example of a Class C broadcast address? answer: 221.218.253.255 8. What is decimal number 164 in binary? answer: 10100100 8. Which of the following is the approximate number of hosts supported in a answer:65 thousand 8. Which of the following describes the relationship between path determination and the routing of packets? answer: they are the same process 8. Which OSI layer adds an IP header? answer: Layer 3 8.Which type of addressing scheme is formed by MAC addresses? answer: flat 8. Which address(es) appear in an IP packet's header? answer: source and destination addresses 8. Which of the following is a benefit of network segmentation? answer: reduced congestion 8. Which of the following would be the decimal value of the binary IP address 11 001101.11111111.10101010.11001101? answer: 205.255.170.205 Why is a static route the preferred method for reaching stub networks? answer: static routing requires less overhead What is described when a router acts as a default gateway, allowing a device on one subnet to find the MAC address of a host on another subnet? answer: proxy ARP Which is an example of a routed protocol? answer: IPX/SPX IP relies upon which OSI layer protocol to determine whether packets have been l ost and request retransmission? answer: transport What do routers use to exchange routing tables and share route information?

answer: routing protocols Which type of routing allows routers to adjust to changing network conditions? answer: dynamic Which of the following is an example of an IGP (Interior Gateway Protocol)? answer: IGRP In a connectionless system, which of the following is correct? answer: The destination is not contacted before a packet is sent. Which is a network layer protocol that can be routed? answer: IP What are the two proprietary routing protocols developed by Cisco? answer: IGRP and EIGRP When configuring a host computer, which of the following describes the router in terface that connects to the same network segment? answer: default gateway In the URL http://www.cisco.com, the "cisco.com" part identifies what? answer: the domain The Telnet application works mainly at which layers of the OSI model? answer: application, presentation, and session Which application layer protocol supports e-mail programs? answer: POP3 What is the language used to create web pages? answer: HTML What is an example of an application that requires both a client and server comp onent in order to function? answer: web browser If you want to save a word processor file on a network server, what network prot ocol enables the word processing application to become a network client? answer: redirector Which of the following allows for routing that is based on classes of address, r ather than individual addresses? answer: IP address Which protocol is designed to download or upload files on the Internet? answer: FTP Which layer of the OSI model is closest to the user and determines whether suffi cient resources exist for communication between systems? answer: application Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs? answer: redirector Which connection is made to a server and maintained until the user terminates th e connection? answer: downloading a web page

What type of server is used to translate a domain name into the associated IP ad dress? answer: DNS E-mail addresses consist of which two parts? answer: recipient's username and postoffice address Which OSI layer does not provide support for any other OSI layer? answer: application Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page? answer: hyperlink What is the data-link destination address of a broadcast message? answer: FFFF.FFFF.FFFF What happens if host A broadcasts an ARP request looking for the MAC address of host B which is located on the same network as host A? answer: All devices look at the request and ONLY host B will reply with the MAC address. Network File System (NFS), SQL, and X Window System all operate at which Layer o f the OSI Model? answer: Session Which best describes the structure of a MAC address? answer: 24 bit vendor code plus 24 bit serial number

You might also like