IT6201 Data Communications and Networking 1 (Finals Q1 & Q2)

 This course covers configuring and implementation of LAN networks.


IT6201 Data Communications and Networking 1

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In fiber optic meda, the signals are represented as patterns of .

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which statement is correct about network protocols?

Select one:

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which two message timing mechanisms are used in data communication? (Choose two.)

Select one or more:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which logical address is used for delivery of data to a remote network?

Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

 address is defined as a reserved address that routes packets back to the host

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which two statements are true of the deterministic access method?(Choose two.)

Select one or more:

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)

Select one or more:

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What type of delivery uses data link layer addresses?

Select one:

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the purpose of protocols in data communications?

Select one:

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which two components are added to the PDU at the network access layer? (Choose two.)

Select one or more:

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which two factors influence the method that is used for media access control? (Choose two.)

Select one or more:

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which is a function of the Logical Link Control (LLC) sublayer?

Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is an advantage of using standards to develop and implement protocols?

Select one:

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What will a network administrator use to modify a configuration on a Cisco router?

Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

Select one:

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which two statements are true regarding the user EXEC mode? (Choose two.)

Select one or more:

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the parts of an IPv4 address? (Choose two.)
Select one or more:

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which message delivery option is used when all devices need to receive the same message simultaneously?

Select one:

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

Select one:

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What happens when two devices on the same subnet are communicating?

Select one:

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The TCP/IP application layer effectively consists of which three OSI layers?
Select one:

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The 8-bit binary value for 41 is 

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will most likely happen?
Select one:

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What three protocols do email users and servers use to process email? (Choose three.)
Select one or more:

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is 

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?

Select one:

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which statement is true about an interface that is configured with the IPv6 address command?

Select one:

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is an advantage that UDP has over TCP?
Select one:

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?

Select one:

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The last host address on the 10.15.25.0/24 network is 

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the purpose of using a source port number in a TCP communication?

Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What does UDP do when receiving messages that are more than one datagram in length?
Select one:

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What range of ports can either be used by TCP or UDP to identify the requested service on the destination device or as a client source port?
Select one:

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which application use UDP as the transport layer protocol?

Select one:

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which statement accurately describes public IP addresses?

Select one:

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which number or set of numbers represents a socket?

Select one:

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which TCP header field specifies the number of bytes that can be accepted before an acknowledgement is required?
Select one:

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is a characteristic of UDP?
Select one:

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is assigned by the transport layer to identify an application or service?
Select one: