Question

In: Computer Science

NETWORKING INTRODUCTION QUESTIONS. 1. You are the network administrator for an organization. You boot up a...

NETWORKING INTRODUCTION QUESTIONS.

1. You are the network administrator for an organization. You boot up a router, log into it, and issue a series of commands that changes the IP address of one of the interfaces. Which of the following statements is true? (Choose 2)

  • a. The running config file and startup config file are no longer identical.
  • b. The iOS image has been altered.
  • c. The changes to the configuration are automatically saved to NVRAM.
  • d. The startup config file has been altered.
  • e. The running config file has been altered.

2. What are two characteristics of fiber-optic cable? (Choose two.)

  • a. Each fiber strand carries an electrical impulse in a single direction.
  • b. It is more difficult to terminate than copper.
  • c. Each bundle contains 4 twisted pairs.
  • d. It is not affected by EMI/RFI.
  • e. It uses cross cancellation to protect against interference.

3. Which statements are true regarding physical layer standards? (Choose 2)

  • a. They are defined by the IETF.
  • b. They are developed in part by the EIA/TIA.
  • c. They include electronics and media.
  • d. They are performed in software.

4. How long are the source and destination IP addresses?

  • a. The length will vary depending on the medium carrying the packet.
  • b. 64 bits.
  • c. 32 bits.
  • d. 128 bits.
  • e. 32 bytes.

5. Physical layer standards define all of the following except?

  • a. Voltage.
  • b. Encoding.
  • c. Congestion.
  • d. Media.
  • e. Bandwidth.

6. You are receiving a file using a TCP protocol. During the three way handshake the computers agreed to a 10,000 byte window. What will happen if only 5000 bytes are acknowledged?

  • a. The destination will reduce the window size.
  • b. The sender will reduce the window size.
  • c. The sender will acknowledge 5000.
  • d. The destination will not acknowledge until the lost 5000 is retransmitted.

7. You are a network administrator of a small company that is upgrading its existing IP network. Currently the network utilizes UTP to the desktops. You wish to upgrade to fiber multi-mode to the desktops. What changes do you need to make to the IP settings of the devices in the network?

  • a. Migrate to IPv6 as only IPv4 does not support fiber.
  • b. Increase the TTL settings.
  • c. Decrease the TTL settings.
  • d. No changes to IP settings are required.

8. You are a network administrator for an organizations. One of the end users complains that her PC cannot access any website. You investigate and find that the PC cannot communicate with any other device. You suspect the problem lies with the TCP/IP protocol stack on the host. What command will test whether this is the problem?

  • a. Ping 127.0.0.1
  • b. Ping 0.0.0.0
  • c. Ping [IP address of default gateway]
  • d. Ping 1.1.1.1
  • e. Loopback 127.0.0.1

9. Why is media access control required for Ethernet?

  • a. To avoid overwhelming a destination NIC card.
  • b. To retransmit a segment if it is lost.
  • c. To provide a mechanism for one host to use a shared media if no other host is using it.
  • d. To manage who’s turn it is to communicate on a shared media.

10. Which is true about the HTTP protocol?

  • a. It is a request response protocol.
  • b. It sends secure request across the network.
  • c. It uses SSL.
  • d. It uses the GET message to upload resources to the web.

11. Ethernet uses what access method?

  • a. Priority sharing
  • b. CSMA/CA
  • c. Token passing
  • d. CSMA/CD

12. Which UTP cable is used to connect a switch port to a PC?

  • a. Rollover
  • b. Console
  • c. Straight-through
  • d. Crossover

13. Which is true regarding DHCP services?

  • a. The DCHP request follows the DHCP offer.
  • b. The first step in DHCP is the host sending a DHCP request.
  • c. DHCPACK lets the server know that the host accepted the offer.
  • d. If two DHCP servers exists on the same network you might get a DHCPACK from both.

14. Which is not true regarding email protocols?

  • a. A host uses the POP protocol to communicate directly with another email client.
  • b. Mail servers uses SMTP to communicate with each other.
  • c. Mail clients connect to their server using port 25.
  • d. If the destination server is not available, the sending email servers spool the message and tries again later.

15. Bandwidth is measured in all of the following except___________?

  • a. Mega Bytes per second.
  • b. bits per second.
  • c. kilo bits per second.
  • d. Gb/s d Tb/s

16. You are receiving a VOIP call. What transport layer feature allows the receiving data to stay live?

  • a. Permeant circuit (session)
  • b. Connection oriented
  • c. Low overhead
  • d. Reliable delivery

17. You open multiple browsers on a single PC to access a website. The web server sends a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the web browsers should receive the reply?

  • a. The source layer 3 address.
  • b. The destination layer 3 address.
  • c. The source port number.
  • d. The destination port number.

18. What is encapsulated around a packet at layer 2? (Choose 2)

  • a. Data.
  • b. Trailer.
  • c. Header.
  • d. Bits.

You could answer with the letters or type it out per question. I appreciate it.

Solutions

Expert Solution

Answer 1
**********
c. The changes to the configuration are automatically saved to NVRAM
e. The running config file has been altered

Answer 2
**********
c. Each bundle contains 4 twisted pairs.
d. It is not affected by EMI/RFI

because it has conductors

Answer 3
**********
a. They are defined by the IETF
c. They include electronics and media.

Answer 4
**********
a. The length will vary depending on the medium carrying the packet.

if it uses ipv4 then 32 bit if it uses ipv6 then 128bit

Answer 5
**********
c. Congestion.

We are allowed to do only 4 exercise out of any given.

if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)


Related Solutions

You are a network administrator for your organization and arerequired to plan and deploy a...
You are a network administrator for your organization and are required to plan and deploy a new file and print server that will service Windows, Linux, and Macintosh client computers. In addition, the server will provide DHCP services on the network and host a small Web site listing company information. In a brief document, draft the services that you plan to implement for this server and the methods that you will use to maximize the security of the system.
(b) You have been employed as a network administrator in an organization. If you have to...
(b) You have been employed as a network administrator in an organization. If you have to send the data of your organization through the internet (there might be very untrusty network nodes), what kind of encryption will you use? Further, sometimes attackers exploit a special feature of the transport layer (segmentation and reassembly) to launch an attack. What attack is this? (c) Of the various firewall types available for use in a business network, which type collects network connection information...
Assume you are the network administrator for a mid-sized organization. Recently, management has given permission for...
Assume you are the network administrator for a mid-sized organization. Recently, management has given permission for several employees to work remotely. Your organization has used VPN access in the past for short-term traveling assignments. Discuss the pros and cons of implementing DirectAccess, and always on VPN vs normal VPN solutions. Your post should be 250-500 words.
Network Organization Model Research a company that you believe uses a network organization model. Describe the...
Network Organization Model Research a company that you believe uses a network organization model. Describe the company, and explain why you think the company uses a network organization model, Answer in 7-10 sentences. For each website you visit to find information, if you use that information be sure to put it in your own words and include that website as a reference in APA format. Learning Organization Research a company that you believe is a learning organization. Describe the company,...
You are converting your network to an IP addressing scheme. You assign a junior administrator the...
You are converting your network to an IP addressing scheme. You assign a junior administrator the task of assigning addresses to your network hosts from the IP address range 202.17.68.0-202.17.68.255. He states that he used every one of the 256 addresses in the range. Which devices on the network will be unable to communicate with other network devices? Routers are protocol dependent at which OSI model layer? You are the network administrator for a large, global internetwork. You must update...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
Security and Network Discussion Questions a) Discuss the pros and cons of an organization regularly engaging...
Security and Network Discussion Questions a) Discuss the pros and cons of an organization regularly engaging in penetration testing. + b) What are the motivations of the ethical hacker?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT