Академический Документы
Профессиональный Документы
Культура Документы
Section: ___________________________
1. What technique is used with UTP cable to help protect against signal interference from crosstalk?
a. Terminating the cable with special grounded connectors.
b. Twisting the wire together into pairs.
c. Wrapping a foil shield around the wire pairs.
d. Encasing the cables within a flexible plastic sheath.
32. What statement describes a characteristic of MAC addresses?
a. They must be globally unique.
b. They have a 32-bit binary value.
c. They are only routable within the private network.
d. They are added as part of a Layer 3 PDU.
33. What IPv4 header field identifies the upper layer protocol carried in the packet?
a. Differentiated Services
b. Version
c. Protocol
d. Identification
34. A message is sent to all hosts on a remote network. Which type of message is it?
a. Multicast
b. Directed broadcast
c. Limited broadcast
d. Unicast
35. What is the prefix length notation for the subnet mask 255.255.255.224?
a. /25
b. /26
c. /27
d. /28
36. What kind of port must be requested from IANA in order to be used with a specific application?
a. Private port
b. Dynamic port
c. Registered port
d. Source port
37. Which statement is true about FTP?
a. The client can download the data from or upload data to the server.
b. The client can choose if FTP is going to establish one or two connections with the server.
c. FTP is a peer-to-peer application.
d. FTP does not provide reliability during data transmission.
38. What is a characteristic of a converged network?
a. It limits the impact of a failure by minimizing the number of devices affected.
b. It provides only one path between the source and destination of a message.
c. A converged network requires a separate network infrastructure for each type of communication
technology.
d. It delivers data, voice, and video over the same network infrastructure.
39. Why is it important to configure a hostname on a device?
a. To identify the device during remote access (SSH or Telnet).
b. To allow local access to the device through the console port.
c. A hostname must be configured before any other parameters.
d. A Cisco router or switch only begins to operate when its hostname is set.
40. What type of communication will send a message to all devices on a local area network?
a. Allcast
b. Multicast
c. Broadcast
d. Unicast
Application:
41-50.) You are given a IP block of 192.168.0.0 /22 and your boss wants you to get 6 subnets that can accommodate 100
host,60 host, 28 host, 13 host,4 host and 2 host. What would be the Network address of each subnet and its subnet
mask?
Name: ____________________________
Section: ___________________________
31. What technique is used with UTP cable to help protect against signal interference from crosstalk?
e. Terminating the cable with special grounded connectors.
f. Twisting the wire together into pairs.
g. Wrapping a foil shield around the wire pairs.
h. Encasing the cables within a flexible plastic sheath.
32. What statement describes a characteristic of MAC addresses?
e. They must be globally unique.
f. They have a 32-bit binary value.
g. They are only routable within the private network.
h. They are added as part of a Layer 3 PDU.
33. What IPv4 header field identifies the upper layer protocol carried in the packet?
e. Differentiated Services
f. Version
g. Protocol
h. Identification
34. A message is sent to all hosts on a remote network. Which type of message is it?
e. Multicast
f. Directed broadcast
g. Limited broadcast
h. Unicast
35. What is the prefix length notation for the subnet mask 255.255.255.224?
e. /25
f. /26
g. /27
h. /28
36. What kind of port must be requested from IANA in order to be used with a specific application?
e. Private port
f. Dynamic port
g. Registered port
h. Source port
37. Which statement is true about FTP?
e. The client can download the data from or upload data to the server.
f. The client can choose if FTP is going to establish one or two connections with the server.
g. FTP is a peer-to-peer application.
h. FTP does not provide reliability during data transmission.
38. What is a characteristic of a converged network?
e. It limits the impact of a failure by minimizing the number of devices affected.
f. It provides only one path between the source and destination of a message.
g. A converged network requires a separate network infrastructure for each type of communication
technology.
h. It delivers data, voice, and video over the same network infrastructure.
39. Why is it important to configure a hostname on a device?
e. To identify the device during remote access (SSH or Telnet).
f. To allow local access to the device through the console port.
g. A hostname must be configured before any other parameters.
h. A Cisco router or switch only begins to operate when its hostname is set.
40. What type of communication will send a message to all devices on a local area network?
e. Allcast
f. Multicast
g. Broadcast
h. Unicast
Application:
41-50.) You are given a IP block of 192.168.0.0 /22 and your boss wants you to get 6 subnets that can accommodate 100
host,60 host, 28 host, 13 host,4 host and 2 host. What would be the Network address of each subnet and its subnet
mask?