Вы находитесь на странице: 1из 8

Question 1

1 out of 1 points

Define a checksum and describe how Transport layer protocols implement them to ensure data integrity.
Answer Selected Answer:

A checksum is a method of error checking that determines contents of an arriving data unit match the contents of the data unit sent by the source. Checksums are added to data at the source and verified at the destination. If at the destination a checksum doesn't match what the source predicted, the destination's Transport layer protocols ask the source to retransmit the data. To ensure data integrity further, connection-oriented protocols such as TCP use a checksum. A checksum is a unique character string that allows the receiving node to determine if an arriving data unit exactly matches the data unit sent by the source. Checksums are added to data at the source and verified at the destination. If at the destination a checksum doesnt match what the source predicted, the destinations Transport layer protocols ask the source to retransmit the data.
[None Given]

Correct Answer:

Response Feedback:

Question 2
1 out of 1 points

Describe the role of Network layer protocols including the formation of packets, routing and factors considered in routing decisions.
Answer Selected Answer:

Network layer protocols accept the Transport layer segments and add logical addressing information in a network header. At this point, the data until becomes a packet. Network layer protocols also determine the path from point A on one network to point B on another network by factoring in Delivery priorities, Network congestion, Quality of services and cost of alternative routes. Network layer protocols accept the Transport layer segments and add logical addressing information in a network header. At this point, the data unit becomes a packet. Network layer protocols also determine the path from point A on one network to point B on another network by factoring in: Delivery priorities (for example, packets that make up a phone call connected through the Internet might be designated high priority, whereas a mass e-mail message is low priority) Network congestion Quality of service (for example, some packets may require faster, more reliable delivery) Cost of alternative routes

Correct Answer:

Response Feedback:

[None Given]

Question 3
1 out of 1 points

Describe the advantages client/server networks offer over peer-to-peer networks.


Answer Selected Answer:

A peer to peer network utilizes security and file sharing capibilities on each individual computer. A client server network uses a central computer to mandate file sharing and security policies. The client server network has greater security advantages, but is more practical for a large amount of computer clients. On a smaller network, peer to peer sharing is more practical, and cost effective.

Correct Answer:

Although client/server networks are typically more complex in their design and maintenance than peer-to-peer networks, they offer many advantages over peer-to-peer networks, such as: User logon accounts and passwords for anyone on a server-based network can be assigned in one place. Access to multiple shared resources (such as data files or printers) can be centrally granted to a single user or groups of users. Problems on the network can be monitored, diagnosed, and often fixed from one location. Servers are optimized to handle heavy processing loads and dedicated to handling requests from clients, enabling faster response time. Because of their efficient processing and larger disk storage, servers can connect more than a handful of computers on a network. Together, these advantages make client/server networks easier to manage, more secure, and more powerful than peer-to-peer networks. They are also more scalable - that is, they can be more easily added onto and extended - than peer-to-peer networks.

Response Feedback:

[None Given]

Question 4
1 out of 1 points

Define and describe the two parts of a MAC address.


Answer Selected Answer:

The two parts of a MAC address are a block ID and a device ID. The block ID is a six-character sequence unique to each vendor. IEEE manages which block IDs each manufacturer can use. The remaining six characters in the MAC address are added at the factory, based on the NIC's model and manufacture date, and collectively form the device ID.

Correct Answer:

MAC addresses contain two parts: a block ID and a device ID. The block ID is a six-character sequence unique to each vendor. IEEE manages which block IDs each manufacturer can use. For example, a series of Ethernet NICs manufactured by the 3Com Corporation begins with the six-character sequence 00608C, while a series of Ethernet NICs manufactured by Intel begins with 00AA00. Some manufacturers have several different block IDs. The remaining six characters in the MAC address are added at the factory, based on the NICs model and manufacture date, and collectively form the device ID. An example of a device ID assigned by a manufacturer might be 005499. The combination of the block ID and device ID result in a unique, 12character MAC address of 00608C005499. MAC addresses are also frequently depicted in their hexadecimal format - for example, 00:60:8C:00:54:99.
[None Given]

Response Feedback:

Question 5
1 out of 1 points

Define a network operating system (NOS) and describe the tasks it performs.
Answer Selected Answer:

The NOS is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. The most popular networking operating systems are Windows Server 2003, Windows Server 2008, UNIX, Linux and Novell NetWare. An NOS is a special type of software designed to do the following: Manage data and other resources for a number of clients. Ensure that only authorized users access the network. Control which type of files a user can open and read. Restrict when and from where users can access the network. Dictate which rules computers will use to communicate. Supply applications to clients.
[None Given]

Correct Answer:

Response Feedback:

Question 6
1 out of 1 points

Dependability is a characteristic of ____.


Answer Selected Answer:

soft skills
Correct Answer:

soft skills

Question 7

1 out of 1 points

Which OSI model layer manages data encryption?


Answer Selected Answer:

Presentation
Correct Answer:

Presentation

Question 8
1 out of 1 points

____ services refer to the capability of a server to share data files, applications, and disk storage space.
Answer Selected Answer:

File
Correct Answer:

File

Question 9
1 out of 1 points

The process of determining the best path from Point A on one network to Point B on another is known as ____.
Answer Selected Answer:

routing
Correct Answer:

routing

Question 10
1 out of 1 points

A common way of sharing resources on a peer-to-peer network is by modifying the ____ controls using the computers operating system.
Answer Selected Answer:

file-sharing
Correct Answer:

file-sharing

Question 11
1 out of 1 points

____ are the distinct units of data that are exchanged between nodes on a network.
Answer

Selected Answer:

Data packets
Correct Answer:

Data packets

Question 12
1 out of 1 points

Which Data Link sublayer manages flow control?


Answer Selected Answer:

LLC
Correct Answer:

LLC

Question 13
1 out of 1 points

Often, separate LANs are interconnected and rely on several ____ running many different applications and managing resources other than data.
Answer Selected Answer:

servers
Correct Answer:

servers

Question 14
1 out of 1 points

Each network node has ____ types of addresses.


Answer Selected Answer:

two
Correct Answer:

two

Question 15
1 out of 1 points

Transport layer protocols break large data units into ____.


Answer Selected Answer:

segments
Correct Answer:

segments

Question 16
1 out of 1 points

A ____ facilitates communication and resource sharing between other computers on the network.
Answer Selected Answer:

server
Correct Answer:

server

Question 17
1 out of 1 points

In which OSI model layer does IP operate?


Answer Selected Answer:

Network
Correct Answer:

Network

Question 18
0 out of 1 points

Which statement describes a certification drawback?


Answer Selected Answer: Correct Answer:

Certification does not qualify a student for additional degrees. Certification value may be lessened due to the number of people obtaining them.

Question 19
1 out of 1 points

Security auditing is handled by ____.


Answer Selected Answer:

management services
Correct Answer:

management services

Question 20
1 out of 1 points

Which IEEE standard describes Ethernet?


Answer Selected Answer:

802.3
Correct Answer:

802.3

Question 21
1 out of 1 points

Which type of protocol is useful when data must be transferred quickly?


Answer Selected Answer:

connectionless
Correct Answer:

connectionless

Question 22
1 out of 1 points

Hardware diagnosis and failure alert are handled by ____.


Answer Selected Answer:

management services
Correct Answer:

management services

Question 23
1 out of 1 points

The ____ is a fixed number associated with a devices NIC.


Answer Selected Answer:

physical address
Correct Answer:

physical address

Question 24
0 out of 1 points

Which Data Link sublayer manages access to the physical medium?


Answer Selected Answer:

LLC
Correct Answer:

MAC

Question 25
1 out of 1 points

A ____ network is confined to a relatively small space.


Answer Selected Answer:

LAN
Correct Answer:

LAN