IT-6201 Prelim Lab Quiz 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

Question 

1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?
Select one:

a.

(config-line) # password secret

b.

(config)# enable password secret

c.

(config) # enable secret Encrypted_Password

d.

(config) # enable secret Secret_Password

e.

(config) # service password-encryption


Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following OSI model layers have the same functionality as the network access
layer in the TCP/IP model? (Choose two.)
Select one or more:

a.

Presentation

b.

Physical

c.

Transport

d.

Network

e.

Session

f.

Data link

g.
Application
Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which message delivery option is used when all devices need to receive the same message
simultaneously?
Select one:

a.

duplex

b.

broadcast

c.

unicast

d.

multicast
Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is an advantage of using standards to develop and implement protocols?
Select one:

a.

A particular protocol can only be implemented by one manufacturer

b.

Different manufacturers are free to apply different requirements when implementing a


protocol

c.

Standard provide flexibility for manufacturers to create devices that comply with unique
requirements

d.

Products from different manufacturers can interoperate successfully


Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What organization is responsible for the overall management and development of Internet
standards?
Select one:

a.

ISO

b.

IETF

c.

IEEE

d.

IRTF

e.

IAB
Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which organization is responsible for developing communications standards for Voice over
IP (VoIP) devices?
Select one:

a.

The Internet Corporation for Assigned Names and Numbers (ICANN)

b.

The Telecommunications Industry Association (TIA)

c.

The Electronics Industry Alliance (EIA)

d.

The International Telecommunications Union-Telecommunications Standardization Sector


(ITU-T)
Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following elements do both human and computer communication systems
have in common? (Choose three.)
Select one or more:

a.

Keyboard
b.

Channel

c.

Receiver

d.

Default gateway

e.

Source
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which is a function of the Logical Link Control (LLC) sublayer?
Select one:

a.

to accept segments and package them into data units that are called packets

b.
to identify which network layer protocol is being used

c.

to provide data link layer addressing

d.

to define the media access processes that are performed by the hardware
Feedback
Your answer is correct.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference
model? (Choose two.)
Select one or more:

a.

DNS

b.

FTP

c.

TCP
d.

UDP

e.

HTTP
Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which OSI reference model layer is responsible for common representation of the data
transferred between application layer services?
Select one:

a.

Network

b.

Application

c.

Session

d.
Transport

e.

Data link

f.

Physical

g.

Presentation
Feedback
Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which message timing factor impacts how much information can be sent and the speed at
which it can be delivered?
Select one:

a.

Access method

b.

Delay speed
c.

Flow control

d.

Response timeout  
Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What will a network administrator use to modify a configuration on a Cisco router?
Select one:

a.

IOS

b.

Windows Explorer

c.

a control panel

d.
a DHCP server

e.

the Windows command prompt


Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which application layer protocol allows users on one network to reliably transfer files to and
from a host on another network?
Select one:

a.

IMAP

b.

FTP

c.

HTTP

d.

DHCP
e.

TFTP
Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which logical address is used for delivery of data to a remote network?
Select one:

a.

destination port number

b.

source MAC address

c.

source IP address

d.

destination MAC address

e.

destination IP address
Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two components are added to the PDU at the network access layer? (Choose two.)
Select one or more:

a.

IP header

b.

TCP header

c.

HTTP header

d.

Trailer

e.

frame header
Feedback
Your answer is correct.
Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What happens to frames that are too long or too short for the channel used?
Select one:

a.

They are broken up into smaller pieces.

b.

They are returned to the sender.

c.

They are dropped.

d.

They clog the network and block the delivery of other frames.

e.

They are delivered but much slower than proper-size frames.


Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What type of protocol describes communication over a data link and the physical
transmission of data on the network media?
Select one:

a.

Transport protocol

b.

Network access protocol

c.

Internet protocol

d.

Application protocol
Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two statements are true of the deterministic access method?(Choose two.)
Select one or more:
a.

The throughput is predictable

b.

The order of transmission is dictated by the node that asks first for the token

c.

It is a very efficient method because there are no collisions

d.

Each device has to transmit before passing the token to the next device

e.

Devices take turns transmitting


Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the name given to a one-to-many message delivery option?
Select one:
a.

Multicast

b.

Broadcast

c.

Manycast

d.

Unicast
Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which organization is responsible for the standard that defines Media Access Control for
wired Ethernet?
Select one:

a.

IEEE

b.
IAB

c.

ISOC

d.

IETF

e.

ISO
Feedback
Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is and advantage of using standards to develop and implement protocols?
Select one:

a.

A particular protocol can be implemented by one manufacturer

b.

Different manufacturers are free to apply different requirements when implementing a


protocol
c.

Standards provide flexibility for manufacturers to create devices that comply with unique
requirements

d.

Products from different manufacturers can interoperate successfully


Feedback
Your answer is correct.

Question 22
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What three functions are defined by network protocols to allow communication between
known source and destination IP addresses? (Choose three.)
Select one or more:

a.

data encoding

b.

end-device installation

c.

connector specifications

d.
message size

e.

delivery options

f.

media selection
Feedback
Your answer is correct.

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text
light

In fiber optic meda, the signals are represented as patterns of Answer .

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two message timing mechanisms are used in data communication? (Choose two.)
Select one or more:

a.

formatting
b.

flow control

c.

encapsulation

d.

response timeout

e.

encoding
Feedback
Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two statements are true regarding the user EXEC mode? (Choose two.)
Select one or more:

a.

All router commands are available

b.

Only some aspects of the router configuration can be viewed


c.

Interfaces and routing protocols can be configured

d.

Global configuration mode can be accessed by entering the enable command

e.

This is the default mode on an unconfigured router when first powered up.
Feedback
Your answer is correct.

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the transport layer PDU?
Select one:

a.

Segment

b.

Packet

c.
Bit

d.

Data

e.

Frame
Feedback
Your answer is correct.

Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are examples of proprietary protocols? (Choose two.)
Select one or more:

a.

TCP/IP

b.

AppleTalk

c.

ISO
d.

Novell NetWare
Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What name is given to a group of interrelated protocols necessary to perform a
communication function?
Select one:

a.

Functional collection

b.

Functional protocol

c.

Protocol stack

d.

Protocol suite
Feedback
Your answer is correct.

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What happens when two devices on the same subnet are communicating?
Select one:

a.

The sending device will use ARP to determine the IP address of the receiver

b.

The host portion of the IP addresses will be different

c.

The frame will be sent to the default gateway for delivery to the receiving device

d.

The data link layer addresses are added to the IP header


Feedback
Your answer is correct.

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the purpose of protocols in data communications?
Select one:

a.

specifying the bandwidth of the channel or medium for each type of communication

b.

specifying the device operating systems that will support the communication

c.

providing the rules required for a specific type of communication to occur

d.

determining the electronic specifications to enable the communication


Feedback
Your answer is correct.

Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which organization develops the 802 family of standard for wired and wireless LANs and
MANs?
Select one:

a.

IEEE
b.

ISO

c.

ISOC

d.

ITU-T

e.

IANA
Feedback
Your answer is correct.

Question 32
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two factors influence the method that is used for media access control? (Choose
two.)
Select one or more:

a.

how nodes share the media


b.

how data is generated by end devices applications

c.

how the IP protocol forwards the packet to the destination

d.

how signals are encoded by the NICs on end devices

e.

how connection between nodes appears to the data link layer


Feedback
Your answer is correct.

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement is correct about network protocols?
Select one:

a.

They are only required for exchange of message between devices on remote network

b.

Network protocols define the type of hardware that is used and how it is mounted in racks
c.

They all function in the network access layer of TCP/IP

d.

They define how messages are exchanged between the sources and the destination
Feedback
Your answer is correct.

Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text
loop-back

A Answer  address is defined as a reserved address that routes packets back to the
host

Question 35
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which TCP/IP model layer is responsible for providing the best path through the network?
Select one:

a.

Internet
b.

Transport

c.

Network Access

d.

Application
Feedback
Your answer is correct.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy