You are on page 1of 9

Systems Engineering Program

Academic Activities for the Final Note Second Cut

NETWORKING COURSE

To obtain the remaining 70% of our second calification,


an evaluation will be carried out with the battery of 20
questions, which will weigh 50% and a presentation will
be made of at most 10 slides on the topic that you like to
choose, this activity will be worth 20%.

The maximum delivery date of these two activities is


Saturday 02 of the MAY at 18:30:00.

Although you cannot go back and start again, you can start now and
build a splendid and brilliant ending.
ACTIVITY 1: FILLING OUT THE DIGITAL BATTERY

Read each question and use the answer sheet to fill out
your answer, keep in mind the questions with false or
true answers, to avoid mistakes in your notation

EXERCISE 01:

The IPV4 address: 187.34.97.66, has an iPV6 notation equivalent defined as:

1-0000:0000:0000:0000:0000:FFFF:BB:34:34:56

2- 0000:0000:0000:0000:0000:FFFF:BB:74;12:45

3- 0000:0000:0000:0000:0000:FFFF:BB22:6142

4- 0000:0000:0000:0000:0000:FFFF:BB:22:61:42

5-NO PREVIOUS VALUE APPLIES

EXERCISE 02:

The machine address, whose binary notation begins with bits 110,
corresponds to a class address:

1 - [A] 2-[D] 3-[E] 4-[C] 5-[B]

EXERCISE 03:

The______________ Controls the assignment of the services requested by


the user, along with the sequence of activities and events in the application.

the space existing in this text is appropriately filled with the term indicated
by:

1-[CIDR NOTATION] 2- [LINK LAYER] 3-[NETWORK PREFIX]

4-[SESSION LAYER] 5-[APPLICATION LAYER]


EXERCISE 04

This address 10101000001000110010101000011110 corresponds to:

[1] 256.45.142.78 [2] 123.45.98.00 [3] 178.98.124.67 [4]168.35.42.30

[5] 168.35.24.47

EXERCISE 05:

The ISP assigns the Token or interface identifier in an ipv6 address.

[FALSE] [TRUE]

EXERCISE 06:

The _______________ defines the first address that can be assigned in the
configured network.

The previous space in the text is correctly filled out with the term indicated
by

[1] RIR [2] ISP [3] WILDCARD [4] WINMAX [5] HOSTMIN

EXERCISE 07:

The IPV4 equivalent of the IPV6 address shown:

4589:ABC5:0000:5678:1200:0023:7C04:D327 is

[1] This address is wrong defined [2] 128.45.64.115

[3] 112.45.67.115 [4] 125.50.34.67 [5] 125.04.211.39


EXERCISE 08:

The following address associated with the mask 255.255.252.0 has the CIDR
notation marked by

[1] /22 [2] /18 [3] /24 [4] /17 [5] /20

EXERCISE 09:

the number of free addresses defined by an address associated with the


subnet mask with CIDR notation, is determined by subtracting the / K prefix
from 32 and raising 2 to that value; according to this explanation, then the
address 255.248.0.0/13, will generate this number of possible addresses:

[1] 8192 [2] 16384 [3] 524288 [4] 1048576 5 [NONE OF THE ABOVE]

EXERCISE 10:

The addresses which are listed below 192.165.85.0 y 192.165.85.255


correspond to

[1] Hostmin and hostmax address [2] Widcard and public address

[3] Public and private address [4] Network address and broadcasting address

[5] Public and private address

EXERCISE 11:

FDX mode allows configuring transmission in both directions


simultaneously

[FALSE] [TRUE]
EXERCISE 12:

Given the terms listed below:

1 RIR A 32 BITS

2 BROADCASTING B NYQUIST

3 NOISE C IPV6

4 IPV4 D ADDRESS FOR MESSAGE SENDING

5 NO-NOISE E EXTERNAL ELECTRICAL SIGNAL THAT ALTERS


CHANNEL THE SYSTEM

The association of each term in the left column with the corresponding one
in the right generates the configuration indicated by

[1] 1-C 2-D 3-E 4-A 5-B [2] 1-C 2-D 3-E 4-A 5-B

[3] 1-C 2-D 3-E 4-A 5-B [4] 1-C 2-D 3-E 4-A 5-B

[5] 1-C 2-D 3-E 4-A 5-B

EXERCISE 13:

THE FORMAT OBSERVED: HEADER-TH-SH-PH-AH-DATA, IS STRUCTURED


IN THE LAYER OF THE OSI / ISO MODEL ASSOCIATED WITH

[1]LEVEL OF APPLICATION [2] PHYSICAL LEVEL

[3] RANSPORTATION LEVEL [4] SESSION LEVEL

[5] NETWORK LEVEL


EXERCISE 14:

The ______________ Operates with bytes and data frames, it is responsible


for communicating the sending node with the receiving node.

The previous space in the text is correctly filled out with the term indicated
by

[1] LINK LAYER [2] SESSION LAYER [3] TRANSPORT LAYER

[4] NETWORK LAYER [5] PHYSICAL LAYER

EXERCISE 15:

Delivery time in seconds, for an archive of a million records length equal to


80 bytes per a Nyquist channel whose bandwidth is 10 MHz, it is expressed
as:

[1] 50 [2] 32 [3] 87 [4] 340 [5] ALL THESE VALUES ARE WRONG

EXERCISE 16:

The symbols shown correspond to


[1] FIREWALL - BRIDGE - SWITCH [2] BRIDGE- ROUTER - GATEWAY

[3] ROUTER- FIREWALL- SWITCH [4] ROUTER- FIREWALL- ACCESS POINT

[5] FIREWALL- HUB -SWITCH

EXERCISE 17

When a communication system operates in FDX mode: transactional


exchange is possible in both directions simultaneously, but one station may
be receiving from another while sending the message.

[FALSE] [TRUE]

EXERCISE 18:

When having a power to noise ratio equal to 7 decibels, the maximum


transmission speed that is reached in a Shannon channel is 30 megabits per
second, then the bandwidth of this channel is:

[1] SHANNON’S CHANNEL IS QUIET [2] 45 MHZ


[3] IT CANNOT BE CALCULATED BECAUSE A DATA IS MISSING
[4] 10 MHZ [5] ALL OF THE ABOVE ARE FALSE

EXERCISE 19:
The IPV4 address 220.123.45.80 has its IPV6 equivalent expressed as:

[1] 0000:0000:0000:0000:0000: FFFF: DC7B:2D50


[2] 0000:0000:0000:0000:0000: FFFF: 33FB:5F34
[3] 0:0:0:0:0: FFFF: DC7B:2D50
[4] 0000:0000:0000:0000:0000: FFFF: AC5E:2D50
[5] 1 AND 3 ARE VALID
EXERCISE 20:
The options displayed below: Lightweight Directory Access Protocol (LDAP),
Audio and Video ports, Network location diagram, Detailed network diagram
and Cisco network topology, are common to one of these tools:

[1] TINYCAD [2] LUCIDCHART [3] CISCO PACKET TRACER


[4] EDRAWMAX [5] NETWORK NOTEPAD
ACTIVITY 2: MAKING A PRESENTATION ALLUDING TO
THE SELECTED TOPIC

Using POWER POINT OR CANVA in 8 slides expose the topic you select from
the following list:

[1] CHARACTERISTICS OF THE TELEMATIC HARDWARE


[2] NETWORK SECURITY
[3] WEB SERVERS
[4] APACHE SERVER CONFIGURATION
[5] CLOUD COMPUTING
[6] DISTRIBUTED SYSTEMS

You might also like