Exam Preparation Applied Communication
Exam Preparation Applied Communication
Exam Preparation Applied Communication
WEEK 1
Question 1
When data is being prepared for transmission onto the network, it is broken into small pieces and a
header and trailer are added to each piece to help identify it. What is this process called?
Question 2
Question 3
Which component, located on the motherboard, carries out all the instructions provided by
computer programs?
Question 4
Every NIC has a unique address that consists of a 12-digit hexadecimal value. What is this address
called?
Question 5
Which part of the network communication process is responsible for sending and receiving data to
and from the network media?
Question 6
Which of the following are examples of output devices? (Choose all that apply.)
Question 7
The XYZ company has two offices, one in Chicago, and a brand new office in Pittsburgh. To connect
the two offices, they will need a dedicated line, probably leased from the phone company. What
type of network will they be implementing to connect their two offices?
Question 9
True False
Question 10
Each component of a computer is designed to perform only one specific task-either input,
processing, or output.
True False
Question 11
What makes a computer a "server" is the fact that it has a server operating system installed on it.
True False
Question 12
Question 13
Which component manages the details of communicating with the NIC hardware to send and
receive data to and from network media?
Question 14
Question 15
In order to find out your MAC address, you should open a command prompt and type ipconfig /all.
True False
Question 16
Using the physical mail analogy, what part of an address on an envelope is most like the IP address?
Question 17
Which of the following are examples of input devices? (Choose all that apply.)
WEEK 2
Question 1
True False
Question 2
In network communication, the ______________ address is used to deliver a frame to the correct
computer on the network.
Question 3
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What
protocol does your computer use to learn MAC addresses?
Question 4
b. the destination MAC address of a frame and the port it was received on
c. the source MAC address of a frame and the port it was received on
Question 5
If a router receives a packet and it does not have an entry in its routing table for the destination
network, it will send the packet to its default route, if configured.
True False
Question 6
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
Question 7
A wireless access point is most like which other network device, in that all computers send signals
through it to communicate with other computers?
Question 8
Before a computer can transmit data on a wireless network in some cases, it must send What type of
signal to the AP?
Question 9
b. The switch comes loaded with the most frequently used addresses.
c. The switch uses a mathematical formula to determine what the MAC address would be for each
computer connected to it.
d. It reads the source address and keeps a record of which port the sending computer is on
Question 10
Question 11
True False
Question 12
When a NIC is in "promiscuous" mode, it will process only the frames in which the destination MAC
address matches its own MAC address.
True False
Question 13
What does a switch do if it doesn't find the destination MAC address in its switching table?
c. It forwards the frame to all ports d. Sends an ARP to learn the MAC address
Question 14
What is a frame called that is intended for only one individual computer?
Question 15
What does it usually mean when the activity light on a switch is blinking?
Question 16
a. It's a route set by Microsoft so that all information comes to their servers first.
d. It's where the router sends all packets with destinations of which it has no knowledge.
Question 17
The unit of information containing MAC addresses and an error-checking code that’s processed by
the network interface layer is called a _________.
Question 18
The SSID is configured on which of the following so that it can be distinguished from other available
wireless networks?
WEEK 3
Question 1
When discussing Ethernet standards, what does the XBaseY terminology refer to?
a. the length or type of cabling, the transmission speed, and the type of transmissions
b. the transmission speed, the length or type of cabling, and the type of transmissions
c. the length or type of cabling, the type of transmissions, and the transmission speed
d. the transmission speed, the type of transmissions, and the length or type of cabling
Question 3
Question 4
Question 5
Question 6
d. frame payload
Question 7
a. Stations can transmit and receive but not at the same time.
A collision can occur on a switch only if the switch is operating in full-duplex mode.
True False
Question 10
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless
computer, it is operating in what mode?
Question 11
When discussing Ethernet standards, what does the XBaseY terminology refer to?
a. the transmission speed, the type of transmissions, and the length or type of cabling
b. the transmission speed, the length or type of cabling, and the type of transmissions
c. the length or type of cabling, the transmission speed, and the type of transmissions
d. the length or type of cabling, the type of transmissions, and the transmission speed
Question 12
Which of the following is a field of the most common Ethernet frame type?
WEEK 4
Question 1
Question 2
Question 3
After the Internetwork layer places its header on a datagram, what is the unit of information is
referred to?
a. packet b. frame c. segment d. data
Question 4
Which term refers to stripping header information as a PDU (Protocol Data Unit) is passed from one
layer to a higher layer?
Question 5
Question 6
Question 7
Question 8
If you want a computer to be assigned the same IP address each time an address is assigned, what
DHCP option should you configure?
Question 9
TCP establishes a connection with the destination device using which process?
Question 10
IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite
in LANs.
True False
Question 11
Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into
smaller segments?
a. Transport b. Network access c. Application d. Internetwork
Question 12
The Internetwork layer includes ICMP and ARP, among other protocols within the TCP/IP suite.
True False
Question 13
Question 14
DNS is a protocol that automatically provides a computer with its IP address configuration.
True False
Question 15
The first packet in the four-packet exchange between a DHCP client and server is the DHCPRequest.
True False
Question 16
Question 17
Question 18
Question 19
When using TCP/IP, which of the following must computers on the same logical network have in
common?
Question 2
Question 3
Question 4
An IP address consists of four octets separated by periods. Which part of this address denotes its
class?
Question 5
If your orginal network address with prefix is 172.16.0.0/16, what should your new network address
with prefix be if you need 16 subnets?
Question 6
Question 7
True False
Question 8
An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented
by a decimal number from 0 to 255.
True False
Question 9
Which IP addressing process enables workstations to use private IP addresses to access the Internet?
Question 10
Question 11
Question 12
Which IP address expressed in CIDR notation has the subnet mask 255.255.255.0?
a. 172.29.111.201/18 b. 172.16.88.222/16
c. 192.168.100.1/26 d. 10.100.44.123/24
Question 13
c. Connectionless communication
d. Built-in security
Question 14
Question 2
Question 3
If you don’t want wireless clients to view the name of your wireless network, what feature should
you use?
Question 4
Communications through a router are noticeably faster than communications through a switch.
True False
Question 5
Which of the following is not a function that would be found in a managed switch?
d. Connect LANS
Question 7
You have two eight-port switches. On each switch, seven stations are connected to ports, and the
two switches are connected with the eighth port. How many collisions domains are there?
a. 8 b. 14 c. 16 d. 15 e. 1
Question 8
Question 9
Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the
frame?
Question 10
Which of the following would be found in a routing table on a router? (Choose all that apply.)
Question 11
Question 12
Each interface on a router must have an IP address and what else to be able to communicate on the
network?
Question 14
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most
wireless networks.
True False
Question 15
Question 16
Which of the following is not a true statement regarding the function of a switch?
Select one:
Question 17
Which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to
communicate with a computer with the IP address 172.31.209.122/24?
Question 18
All network switches require substantial configuration before they can be put into operation in a
network.
True False
Question 19
The time it takes for all the routing tables on every router in a network to be fully updated, either
when a change occurs or according to a schedule, is called the speed of what?
Question 2
Which term best describes the place in a WAN connection where the customer’s responsibility ends,
and the provider’s responsibility begins?
Question 3
Question 4
Which of the following terms describes the category of cloud computing in which a customer
develops applications using development tools and infrastructure provided by the service provider?
Question 5
Which cloud computing category refers to the use of software hosted on a service provider's
network, and is usually subscription based?
Question 6
Which cloud computing category allows a company to quickly provision additional disk space?
True False
Question 8
When would you most likely NOT choose to use a leased line connection?
Question 9
The plain old telephone service is a good example of what kind of WAN technology?
WEEK 8
Question 1
What type of wiring should be used for a high-speed connection between two buildings?
Question 2
Which of the following is NOT one of the main differences between the types of network cabling?
a. the speed at which the signal can be sent b. the ability to send and receive signals
c. the distance that a signal can travel d. the type of signal that the media can transmit
Question 3
What is the maximum cable length for both category 5e and category 6 UTP cable?
a. 20 m b. 1000 m c. 10 m d. 100 m
Question 4
The space between a false ceiling and the true ceiling where heating and cooling air circulates is
called the ______________.
Question 5
Each cable type can transport data at a particular speed only so far before its signals begin to
weaken past the point that a receiving station can read them accurately What is the term for this
phenomenon?
Question 7
Question 8
Question 9
Question 10
Which type of wireless technology bounces transmissions off walls and ceilings to deliver signals
from sender to receiver and is often used with TV remotes?
Question 11
Which of the following conditions requires cables not to exceed a recommended maximum length?
Question 13
Which of the following is a length of cable that connects a computer to either a networking device or
to an RJ-45 jack?
Question 14
Question 15
There are two basic categories of physical cabling used in Ethernet networks. They are copper wire
and fiber optic.
True False
Question 16
What are all of the connections in a network considered, including the cables and their connectors?
Question 17
Question 18
Question 19
Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference
and highly resistant to eavesdropping.
True False
Question 20
WEEK 9
Question 1
Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control
sublayer?
Question 2
Which layer is responsible for determining the best path a packet should travel across an
internetwork?
Question 3
What is the IEEE standard that governs all forms of Ethernet media and interfaces?
Question 4
What information would you find in the header of a Transport layer PDU?
Question 5
The Transport layer segments data into smaller chunks, the size of which is determined by which of
the following?
Question 6
One job that a router performs is that of gatekeeper, which means that it can be configured to only
allow certain packets access into the network based on a list of rules. What is that process called?
What layer is responsible for making sure that the data that it sends and receives is in a format that
the receiving and sending computers can understand?
Select one:
a. 7 b. 6 c. 4 d. 5
Question 8
The Network layer communicates with the Data Link layer and the Session layer.
True False
Question 9
Question 10
The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC
sublayer.
True False
Question 11
At which layer would you find errors that were caused by EMI?
Question 12
What is a PDU?
b. It is a unit of measurement for the maximum amount of data that can be transferred.
Question 13
Which layer is responsible for determining the best path a packet should travel across an
internetwork?
How can you find out what your MAC address is?
Question 15
Which is the IEEE standard that sets the standards for wireless networking?
Question 16
One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP
address.
True False
Question 17
True False
Question 18
At each layer of the OSI model, data is appended to the original message and then sent on to the
next lower layer. What is this process called?
Question 19
What does the Transport layer use to make sure that a message is reassembled correctly on the
receiving device?
a. window Size b. sequence number c. destination port number d. source port number
WEEK 10
Question 1
Question 2
In a physical bus topology, both ends of the medium must be terminated in order to prevent what?
Question 3
Question 4
In which topology does a central device communicate with two or more other devices and is used in
WANs where a main office has connections to several branch offices via a router?
Question 5
Question 6
True False
Question 7
Question 8
True False
Question 9
What is the most common topology and technology combination in use today?
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless
computer, it is operating in what mode?
WEEK 11
Question 1
a. 64 b. 32 c. 48 d. 128
Question 2
The last 64 bits of an IPv6 address are the interface identifier. What is frequently used to specify the
interface identifier?
Select one:
Question 3
Which of the following are solutions to the shortage of available IPv4 addresses? (Choose all that
apply.)
Question 4
Question 5
a. 15 b. 12 c. 13 d. 10
Question 6
How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the
host ID is 64 bits?
a. 32 b. 48 c. 16 d. 64
Question 7
True False
SHORT ANSWERS
WEEK-1
1) What is a peer-to-peer network, and what are it's advantages and disadvantages?
A peer-to-peer network is a collection of computers in which each computer can act
as a client or a server, or both, and each has equal authority. Advantages of a peer-
to-peer network are that it is easy to install, is relatively inexpensive to implement,
doesn't require extensive training or special staff, and the lose of a single machine
will not cripple the network. Disadvantages include lack of security, difficult to locate
resources, reduced performance when computer is acting as server, and limitation
on the number of users.
2) What is a server-based network, and what are it's advantages and disadvantages?
ADVANTAGE
(2) Highly scalable due to (a) use of a common database to store network
management information and (b) ability of network operating system software to
support large complex networks
(3) Supports a wider range of network based applications due to the ability of NOS
to provide more extensive support to these applications
DISADVANTAGE
(1) Cost of the hardware (network server) and software (network operating system)
A client operating system is designed mainly to run user applications like a word processor or
spreadsheet program and to access network resources like file servers or the Internet. A server
operating system is designed to provide clients with access to network resources such as directory
services, shared files, and e-mail.
5) What is the difference between an intranet and an extranet?
INTRANET EXTRANET
An intranet is unique to an organization Extranet is for individuals or group of
or group of people who work together personnel who want to send private
at a place information
Private intermediately Extremely Private
Independent yet dependent on internet Dependent on internet and intranet
Firewall it can have Yes is have firewall.
Data that is stored in short-term storage is completely erased when the computer is powered off.
When the computer is turned back on, there is no trace of any previous data. The computer
transfers programs and files into this short-term storage to make it readily available for the CPU.
Long-term storage retains its data even when no power is applied to the computer. Long-term
storage is where programs and files are stored.
WEEK 2
1) What are the key differences between a switch and a router?
Routers are used to connect LANs together. A switch is used to connect computers and
other devices together to form a LAN. Routers are intelligent just like a switch, but routers
deal with IP addresses instead of MAC addresses and packets instead of frames. Switches
forward broadcast messages to all devices on a LAN, but routers separate LANs so they do
not forward broadcast messages.
The major difference is that switches are intelligent. They examine each frame that they
receive for the destination MAC address and then send the frame out the correct port for that
address. A hub simply accepts a frame from one of its ports and then sends it out all ports. A switch
also keeps a table of MAC addresses so that it knows where to send a frame. Because a switch can
control where it sends a frame, devices that are connected to a switch can communicate at the same
time, allowing each device to access the full network bandwidth. With a hub, only one device can
transmit at a time so the bandwidth is shared among all connected devices. Also, because a switch
controls the flow of frames, there is little chance of a collision. In a hub, collisions might occur
frequently when under heavy use.
3) What are the major tasks that a NIC performs?
A NIC, along with its driver, provides your computer with a connection to the network
medium. When a NIC receives a packet from the network protocol, it encapsulates the
packet with the source and destination in a new header and the CRC in a trailer. Then it
converts the frame into bits and sends it to the network medium. When the NIC receives a
message, it does the reverse, converts the bits into a frame. Then the NIC checks the
destination MAC to make sure that it is the same as its own or a broadcast address. It then
removes the header and trailer and sends the packet on up to the network protocol.
WEEK 3
Absorption – solid objects absorb radio signals, causing them to attenuate (weaken)
Refraction – the bending of a radio signal as it passes from a medium of one density through
a medium of a different density
Reflection – occurs when a signal hits a dense, reflective material, resulting in signal loss
Scattering – when a signal changes direction in unpredictable ways, causing a loss in signal
strength
WEEK 4
1) Briefly describe ARP, include the meaning of its acronym and the layer in which it functions.
ARP stands for Address Resolution Protocol, and it functions in the Internetwork layer. ARP's
job is to find the MAC address of a device given its IP address
2) What is the difference between TCP and UDP?
- Transmission Control Protocol
- connection-oriented protocol, a connection can be made from client to server, and from
then on any data can be sent along that connection.
- when you send a message along this protocol's socket, you know it will get there unless
the connection fails completely. If it gets lost along the way, the server will re-request
the lost part. This means complete integrity, things don't get corrupted.
- if you send two messages along a connection, one after the other, you know the first
message will get there first. You don't have to worry about data arriving in the wrong
order.
- when the low level parts of the this protocol "stream" arrive in the wrong order, resend
requests have to be sent, and all the out of sequence parts have to be put back together,
so requires a bit of work to piece together.
UDP
- User Datagram Protocol
- A simpler message-based connectionless protocol. With this protocol, you send
messages(packets) across the network in chunks.
- When you send a message, you don't know if it'll get there, it could get lost on the way.
- If you send two messages out, you don't know what order they'll arrive in.
- No ordering of messages, no tracking connections, etc. It's just fire and forget! This
means it's a lot quicker, and the network card / OS have to do very little work to
translate the data back from the packets.
WEEK 5
An IP address connects with the network to assign itself on the network. An IP address will
be given to every device that utilizes the network to give it an identity when connecting to
the source of connection like a router.
2) How does a computer know when to send packets to the default gateway?
The only way to know is by consulting the subnet mask. Computers determine the network
ID by doing a logical AND operation between its IP address and subnet mask. This tells
computers whether or not they are on the same network. If Computer 2 is on a different
network than Computer 1, then Computer 1 knows that the packet must be sent to the
default gateway.
3) List and describe three improvements that IPv6 has over IPv4.
IPv6 has a larger address space, a hierarchal address space, autoconfiguration, built-in
quality of service (QoS) support, built-in support for security, support for mobility, and
extensibility.
4) Discuss Network Address Translation (NAT).
NAT stands for network address translation. The NAT protocol is used when connecting
multiple devices on internal private networksto a public network such as the Internet using a
limited number of public IPv4 addresses. It was originally designed for conserving IPv4
address space because the IPv4 address space is not big enough to uniquely identify all
devices that need Internet connectivity. typically NAT is used when a private IP address
needs to be routed in a public network, let's say internet. but it could also be used when
there is an overlap between intranets.
WEEK 6
1) Discuss Cloud Computing, what are the advantages and disadvantages? Name and describe
the three main Cloud Computing categories.
ADVANTAGE
Less expensive, fewer staff people with greater focus and more time, increased
agility/scalability, remote access, disaster recovery, easier to use, improved service and
performance.
DISADVANTAGE
supplies an environment where software developers can build and deliver web-based
applications/services over the internet.
A cloud computing service where providers host software apps and the data stored in them.
NO part of the software resides in the users computer. Accessible via internet, and typically
based off subscription which replaces the need for licenses.
4) When would you use a straight-through cable and when would you use a crossover?
Straight- through cable - are used to connect unlike devices, such as computers to hubs or
switches. All wire pairs are in the same order at each end of the cable. A straight-through
cable is also commonly known as a patch cable.
Crossover cables - are used to connect like devices, such as device to device, switch to
switch, or router to router. In a crossover cable, the transmit conductor at one end is
connected to the receive conductor at the other, allowing both devices to communicate
simultaneously.
WEEK 9
1) List the layers of the OSI model from the top down, along with their counterparts in the
TCP/IP model.
Application—Application
Presentation—Application
Session—Application
Transport—Transport
Network—Internetwork
Data Link—Network Access
Physical—Network Access
OSI Model
The OSI model consists of seven different layers that are labeled from 1 through 7; Figure 1 shows a
representation of the OSI model:
TCP/IP Model
Like the OSI model, the TCP/IP model is layered and is used in the same fashion as the OSI model but
with fewer layers. As the modern Internet and most communications use the Internet Protocol (IP), the
TCP/IP model is technically more in line with modern network implementations. As stated before, the layers
within the TCP/IP model are considered less rigid then that of the OSI model, which basically means that
many protocols implemented can be considered in grey areas between one area and another. The TCP/IP
protocol suite (often referred to as the TCP/IP protocol) contains the same protocols referenced in the
earlier OSI model sections. Figure 2 below shows a representation of the TCP/IP model:
802 is a standard in IEEE. IEEE 802 is a family of IEEE standards dealing with local area
networks and metropolitan area networks.
More specifically, the IEEE 802 standards are restricted to networks carrying variable-size
packets. By contrast, in cell relay networks data is transmitted in short, uniformly sized units
called cells. Isochronous networks, where data is transmitted as a steady stream of octets, or
groups of octets, at regular time intervals, are also out of the scope of this standard. The number
802 was simply the next free number IEEE could assign, [1] though "802" is sometimes associated
with the date the first meeting was held — February 1980.
WEEK 10
2) What is the difference between a network's physical topology and its logical topology?
Physical topologies refer to the physical layout of devices and network media. Logical topologies
refer to the logical paths in which data accesses the media and transmits packets across it.
3)What is the difference between operating in half-duplex mode or full-duplex mode and why does
it eliminate collisions?
When a station is operating in half-duplex mode, the station cannot transmit and receive a
signal at the same time. It must first wait for the medium to be clear of activity, and then it
can transmit. When a station is operating in full-duplex mode, it can transmit and receive
data at the same time. Because a hub repeats its signal to all ports, it can only operate in
half-duplex mode. However, when using a switch, the communication on each port is
isolated, and the switch decides where to send the signal. Therefore, a switch can operate in
full-duplex mode, sending and receiving data at the same time, thus eliminating collisions. If
a switch is set to operate in half-duplex mode, then a collision is possible if the station starts
to transmit at the same time that the switch sends a signal to the station.
WEEK 11
1) List and describe three improvements that IPv6 has over IPv4.
i. IPv6 makes routing efficient.
ii. it is more efficient when it processes packets.
iii. IPv6 also has better security than IPv4.
2) What is an IPv6 anycast address?
An address that represents a group of devices that support a similar service. Each device will
be assigned the same anycast address. Routers will deliver data to the nearest node that is
using the common anycast address. Anycast addresses have a one-to-nearest mapping.