You are on page 1of 6

DATA COMMUNICATION AND NETWORKING 1

What are the primary requirements of information security? (choose 3)

Integrity

Confidentiality

Availability

During a routine inspection, a technician discovered the software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat
is affecting this computer?

Spyware

To save time, ios commands may be partially entered and then completed by typing which key or key
combination?

Tab

The farther you are from the central office when utilizing a DSL connection, the connection speed.

Slower

MIDTERM EXAM

What are the two function that are provided by the network layer? Choose two

Providing end devices with a unique network identifier

Directing data

What happens if the part of an FTP message is not delivered to the destination?

The part of the

Which value, that is contained in a

Time-to-live

What is an advantage of using standards

Product from diff

What is an advantage of UDP over TCP?

UDP communication requires less overhead

Which application use UDP as the transport layer protocol?

SMTP

The 8-binary value for 41 is


00101001

Which action is performed by a client when establishing communication with a server via the use of UDP
at the transport layer?

Mali randomly pati handshake pati size for the session

A ________ address is defined as a reserved address that routes packets back to the host

Loopback

The last host address on the 10.15.25.0/24 network is______

10.15.25.254

How does the network layer use the MTU value?

The MTU is passed to the network

What is an advantage of using standards to develop and implement protocols?

Product from diff

A user is unable to access the company server from a computer. On issuing the

Experimental

Your organization is issued the IPv6 of

16 talaga dapt kaso mali

During troubleshooting procedures, from which location will most Cisco

ROM

What are two functions that are provided by network layer? (Choose two.)

Providing end devices and directing data packets to destination

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

During the boots process, in what memory location will most cisco routers load limited IOS

Flash

Which feature on a cisco router permits the forwarding of traffic for which there is no specific route?

Gateway of last resort

Which three fields are used in a UDP segment header? (Choose two)

Checksum, source port and length

Which entities are involve in a temporary communication that is established by the transport layer?
Applications

When a client connects to an HTTP server by the use of a randomly generated source port number,

The original source port number that was generated by the client

Which address is used as a destination address on a broadcast Ethernet frame?

FF-FF-FF-FF-FF-FF

What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer?

Error detection, addressing and frame delimiting

Which address is a multicast MAC address?

01-00-5E-00-00-C8

A network administrator notices that the default gateway devices sends an ICMP

To notify the workstation

The shortest compressed format of the IPv6 address

2001:DB8:0:1470::200

What is the purpose of using a source port number in a TCP communication?

To keep track of multiple conversations between devices

Which field in an frame is used for error detection?

Frame check sequence

At which layers of the ISO model does Ethernet function?

Data link and physical

Which number or set of numbers represents a socket?

192.168.1.1:80

What is the name given to the Ethernet MAC sublayer PDU?

Frame

What is the minimum and maximum Ethernet frame size as defined by IEEE802.3?

64 bytes – 1518 bytes

Which statement is true about an interface that is configured with IPv6 address command?

A link local

What happens when a data collision occurs on an Ethernet bus?

All devices stop transmitting and try again later.


What is true about Ethernet MAC address?

The first 6, the vendor is responsible for assigning the last 24 bits of the MAC address and

The MAC address is also known as a burned-in

Which statement accurately describes public IP addresses?

Public IP address must be unique across the entire internet

Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC?

IEEE 802.3

Which two factors influence the method that is used for media access control?

How connection and how nodes

What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?

(config)#service password-encryption

What happens when two devices on the same subnet are communicating?

The host portion of the IP

What are the parts of an IPv4 address?

Host and network

What three functions are defined by network protocols to allow communication between known source
and destination IP addresses?

Message size and delivery options

What is the purpose of protocols in data communications?

Providing the rules

Which two message timing mechanisms are used in data communication?

Response timeout and flow control

Which statement is correct about network protocols?

They define how messages are exchange

Which is a function of the logical link control (LLC) sublayer?

To identify

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

IEEE
What type of delivery uses data link layer addresses?

Local delivery

Which two statements are true regarding the users EXEC mode?

This is the default mode and only some aspects

Which two components are added to the PDU at the network access layer?

Trailer and frame header

Which logical address is used for delivery of data to a remote network?

Destination IP address

What will a network administrator use to modify a configuration on a cisco router?

IOS

Which two statements are true of the deterministic access method?

The throughput is predictable

Devices take turns transmitting

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully

In fiber optic meda, the signals are represented as patterns of

Light

Which message delivery option is used when all devices need to receive the same message
simultaneously?

Broadcast

What does UDP do when receiving messages that are more than one datagram in length?

UDP reassembles that data

What are the primary purpose of the transport layer?

Adding the source

Determining the best route kabaliktaran yung sagot

Adding the source

A client is downloading a large file from a server using FTP.

The FTP client responds to the server with a smaller window size in the TCP header.

What is an advantage that UDP has over TCP?


Low overhead

What is a characteristic of UDP?

Connectionless

What three protocols do email users and servers use to process email?

IMAP4

SMTP

POP3

What is assigned by the transport layer to identify an application or service?

Port

The TCP/IP application layer effectively consists of which three OSI layers?

Application, presentation, session

Which TCP header field specifies the number of bytes that can be accepted before an acknowledgement
is required?

Window size

What range of ports can either be used by TCP or UDP to identify the requested service on the
destination device or as a client source port?

1024 to 49151

You might also like