Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Networking Fundamentals: A Comprehensive Exam with Questions and Answers, Exams of Computer Networks

A valuable resource for students studying networking fundamentals. It presents a series of multiple-choice questions and answers covering key concepts such as the osi model, ip addressing, tcp/ip protocols, and routing protocols. the questions are designed to test understanding of core networking principles and are suitable for both university and high school students. The detailed answers offer explanations that enhance learning and comprehension.

Typology: Exams

2024/2025

Available from 04/26/2025

WINGS_TO-FLY
WINGS_TO-FLY šŸ‡ŗšŸ‡ø

1

(1)

1.1K documents

1 / 23

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
FINAL EXAM: PROGRESSION: FIELD
TECH III - IV FINAL EXAM | QUESTIONS &
100% CORRECT ANSWERS (VERIFIED) |
LATEST UPDATE | GRADE A+
The open system interconnection reference model (OSI/R<) Network layer serves which
primary function?
Correct Answer: It uses layer 3 addresses to create multiple routed networks
The address 68.56.189.17 belongs to which internet protocol IP class?
Correct Answer: Class A
What happens to a datagram sent by a higher level protocol to a 127.x.y.z address?
Correct Answer: The datagram loops back inside the host and never leaves the
network interface card (NIC)
Which device evaluates and acts upon a packet's internal protocol (IP) address?
Correct Answer: Router
The network layer must do what to a recieved frame, in order to determine the route
over which it will forward the datagram to the next network?
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17

Partial preview of the text

Download Networking Fundamentals: A Comprehensive Exam with Questions and Answers and more Exams Computer Networks in PDF only on Docsity!

FINAL EXAM: PROGRESSION: FIELD

TECH III - IV FINAL EXAM | QUESTIONS &

100% CORRECT ANSWERS (VERIFIED) |

LATEST UPDATE | GRADE A+

The open system interconnection reference model (OSI/R<) Network layer serves which primary function? Correct Answer: It uses layer 3 addresses to create multiple routed networks The address 68.56.189.17 belongs to which internet protocol IP class? Correct Answer: Class A What happens to a datagram sent by a higher level protocol to a 127.x.y.z address? Correct Answer: The datagram loops back inside the host and never leaves the network interface card (NIC) Which device evaluates and acts upon a packet's internal protocol (IP) address? Correct Answer: Router The network layer must do what to a recieved frame, in order to determine the route over which it will forward the datagram to the next network?

Correct Answer: Decapsulate the packet What network information can be determined from a logical internet protocol (IP) address? Correct Answer: The host portion and network portion the physical address of a device is processed by which layer of the open systems interconnection reference model (OSI/RM)? Correct Answer: The data link layer Which layer of the open system interconnection reference modle (OSI/RM) would you suspect as being the problem when packets arriving at the server but no information is being returned to the client? Correct Answer: The transport layer All computers running on the transmission control protocol/internet protocol (TCP/IP) suite have which of the following in common? Correct Answer: Each computer is assigned its own internet protocol (IP) address A repeater operates at which layer of the open systems interconnection reference model (OSI/RM)? Correct Answer: The physical layer.

What happens when the browser application finishes the downloading the files necessary to display a web page? Correct Answer: The browser server drop the connections, and the browser maintains th epage and its elements in local memory. Which email protocol enables the messages to be viewed without first downloading them from the email server? Correct Answer: Internet Message AccessPprotocol version 4 (IMAP4) What type of server maintains an access log to assist with troubleshooting and tracking down malicious users? Correct Answer: File transfer Protocol Server (FTP) A store and forward email system will not deliver messages until Correct Answer: The host requests the information What is the binary equivalent of decimal 136? Correct Answer: 10001000 Convert the internet protocol (IP) address 172.68.10.2 from decimal to binary. Correct Answer: 10101100.01000100.00001010.

Convert the binary internet protocol (IP) address 01110011.11001000.00101100.00000010 to decimal. Correct Answer: 115.200.44. Which is the result of ANDing the internet protocol (IP) address 23.176.224.18 with the subnet mask 255.224.0.0? Correct Answer: 23.160.0. Which represents the prefix bits for the subnet mask 255.255.0. Correct Answer: / if we borrow 3 bits from a class C network address, how many usable subnets have we created? Correct Answer: 8 What isolates an internet protocol (IP) address's network portion from its host portion? Correct Answer: A network mask What is the best description if the internet protocol (IP) address prefix? Correct Answer: It is the shorthand notation for the combined network and subnet mask.

Correct Answer: A UDP destination port number Which user datagram protocol (UDP) port address enables connection to a device running secure shell? Correct Answer: 22 Which transmission control protocol (TCP) header control bit represents that the message is initiating a connection? Correct Answer: SYN Which of the following two ports are combined in the transmission control protocol (TCP) header? Correct Answer: destination and source You know the logical address of an associates computer on the company's local network and you want to learn the media access control (MAC) address of your associates computer. Which of the following tools could you use? Correct Answer: Address resolution protocol (ARP) What is the primary difference between transmission control protocol (TCP) and user datagram protocol (UDP)? Correct Answer: TCP messages are tracked to ensure they are recieved; UDP messages are sent without tracking.

The five stages of (1) obtaining logical addresses, (2) obtaining physical addresses, (3) establishing a connection between applications, (4) the transfer of information, (5) the termination of the connection are necessary to accomplish what? Correct Answer: The transfer of information accross a transmission control protocol/internet protocol (TCP/IP) network Where does the Domain Name System (DNS) namespace begin? Correct Answer: Root Domains The maximum Domain Name System (DNS) domain name length is how many bytes? Correct Answer: 255 Zones maintain domain name information in which record type? Correct Answer: Resource records When Dynamic Host Configuration Protocol (DHCP) carries vendor specific options, what tells the client the vendor specific format? Correct Answer: Codes 128- 256 At which point in the Dynamic Host Configuration Protocol (DHCP) lease dos the client first attempt to renew its lease? Correct Answer: 50%

On which network type is a static route best used? Correct Answer: stub routing Which network address represents a default route? Correct Answer: 0.0.0.0/0. Which router protocol type shares routing information within the autonomous system (AS)? Correct Answer: Interior Gateway Protocol (IGP). Distance Vector Algorithms (DVA) operate in wihch manner? Correct Answer: They advertise their routing tables directly to directly connected neighbor routers. What can cause routing loops in the flat router architecture? Correct Answer: The router receives data packets before it receives routing information, causing the router to generate additional address request messages for routing information What are routers that belong to the same autonomous system (AS) called? Correct Answer: Interior neighbors What is a benefit of using static routes?

Correct Answer: No bandwidth usage passing updates between routers. Why are routers known as neighbors or peers? Correct Answer: because they exchange routing information When using multipath routing and multiple routes are available for a single destination address, how does the router make the route section? Correct Answer: it selects the route with the highest precedence. Which of the following is a characteristic of static routing? Correct Answer: Static systems do not operate well in an environment of rapid growth or change. When a client connects to a web browser, the first action is typically media access control (MAC) address resolution. Under what circumstance may address resolution be bypassed? Correct Answer: When the client has recently made a request to the same server Which hypertext transfer protocol (HTTP) message request from the client allows it to obtain additional information regarding options and requirements without initiating any actions on the part of the server? Correct Answer: options

Which version of the packet based multimedia communications system, covered be the H.323 standard, was the first to standardize requirements for communications between a pc based telephone and a telephone on the switched circuit network (SCN) of the public telephone system? Correct Answer: version 2 What component of the packet based multimedia communications system covered by the H.323 standard, is considered to be the brain of the network? Correct Answer: the gatekeeper In simple network management protocol (SNMP), when do passive management agents take action on their own initiative? Correct Answer: when certain well-defined error conditions occur the generate an unsolicited message called a trap. Which is the most important of the network troubleshooting steps? Correct Answer: Identify the exact issue. Ipconfig displays which of the following elements of client configuration information? Correct Answer: Default gateway Which of the following is used to verify whether another host on a transmission control protocol/internet protocol (TCP/IP) network is reachable?

Correct Answer: Ping How would an operator find a list of options available for the ping utility? Correct Answer: type "ping" from a command line Which ping option allows you to specify the packet buffer for each ping packet? Correct Answer: Ping - l When troubleshooting, asking the question, has anything changed recently that might have had an impact?", will aid you in : Correct Answer: Identifying the exact issue relating to a problem Which utility should be run to verify that your windows client is configured to use the correct domain name system (DNS) sever? Correct Answer: ipconfig Which of the troubleshooting utilities presented expects a reply when it sends a message to another computer? Correct Answer: ping What entry would be made to log each hop along the way to a specific internet site? Correct Answer: enter "tracert" followed by a host name for the internet site

Correct Answer: The C-band What determines the length of a time division multiplexing (TDM) frame? Correct Answer: The number of input channels to the multiplexer What is an inefficient characteristic of synchronous time division multiplexing (TDM) that is addressed by statistical TDM? Correct Answer: Transport of empty time slots in a synchronous optical network (SONET) what is the basis building block having a data transmission rate of 51.85 Mbps? Correct Answer: The synchronous transport signal (STS) frame What is an X.25 network, whether public or private, typically built upon? Correct Answer: The leased-line facilities of the public telephone network. What are the units called that transport asynchronous transfer mode (ATM) data? Correct Answer: Cells Which of the following commonly is used to classify networks? Correct Answer: The distance between communicating computers Which of the following best describes the difference between a process and a program?

Correct Answer: A process is a subset of a program. The interaction between processes and protocols forms which of the following? Correct Answer: A protocol stack. Port addresses and network addresses are two types of : Correct Answer: Logical addresses Transmitting messages to a from a sending computer process to a receiving computer process is the function of which layer of the open system interconnection (OSI) model? Correct Answer: The Transport layer. Internet Protocol (IP) and x.25 are considered to be which of the following? Correct Answer: Protocols for the network layer. Which of the following accurately describes a bus topology? Correct Answer: All devices are connected by a single electrical circuit. What type of process is located on two computers that perform approximately the same services? Correct Answer: Peer

What synchronous optical network (SONET) standard is 10GBase-EW/LW/SW compatible? Correct Answer: OC- 192 How are store and forward Ethernet switches different from cut through switches? Correct Answer: Store and forward switches are more accurate, but cut through switches are faster. Which layer two type reads the first 64 bytes of frame and then forwards it to hte destination interface? Correct Answer: Fragment free What is the primary reason to build a virtual local area network (VLAN)? Correct Answer: To minimize broadcast traffic. Virtual local area networks (VLAN) are typically implemented using which type of device? Correct Answer: A switch. Devices connected to hub share the same: Correct Answer: Collision domain

Layer 3 switches do a good job of containing which of the following? Correct Answer: Broadcasts Under what license is Linux released? Correct Answer: GNU General Public License (GPL) What is the Linux Shell? Correct Answer: Command interpreter and scripting language. Which Linux application supports centralized user authorization and directory services? Correct Answer: OpenLDAP Which Linux distribution has the distinction of being the oldest surviving Linux distribution that is known for its stability? Correct Answer: Slackware Which of the following is developed as a CD-based Debian like distribution, or design, to run off the CD drive? Correct Answer: Knoppix What is one method of configuring Linux for networking? Correct Answer: Statically