1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
INTERNET
Which two devices would be described as intermediary devices?
Wireless LAN controller
IPS
What characteristic describes a spyware
Software
Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?
DNS
A DNS server stores records that are used to resolve IP addresses to host names. Some DNS record types include the following: –
A – an end device IPV4 address.
NS- an authoritative name server
AAAA – an end device IPV6 address
MX – a male exchange record
What are proprietary protocols?
Protocols developed by organizations who have control over their definition and operation
Explanation: proprietary protocols have their definition and operation controlled by one company or vendor. Some of them can be used by different organizations with permission from the owner the TCP/IP protocol suite is an open standard not a proprietary protocol.
What service is provided by DNS
Resolve domain names, such as cisco.com, into IP addresses
Explanation: domain name system =
DNS
A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?
POP3
Explanation: topic 14.4.3
What commands can be used on a Windows PC to see the IP configuration of that computer?
ipconfig
Explanation: topic 17.5.1
A wired laser printer is attached to a home computer that printer has been shared so that other computers on the home network can also use the printer what networking model is in use?
Peer – to - peer P2P
Explanation: topic 1.2.2
PTP networks have two or more network device devices that can share resources such as printers or files without having a dedicated server
What characteristic describes a virus?
Malicious software or code running on an end device
Explanation: topic 16.2.1
Three bank employees are using the corporate network. The first employee uses a web browser to view a company page in order to read some announcements. The second employee access is the corporate database to perform some financial transactions. The third employee participates in an important live video conference with other corporate managers in branch offices if QOS is implemented on this network what will be the priorities from highest to lowest of the different data types?
Audio conference, financial transactions, webpage
Explanation: topics 1.6.4
QOS mechanisms enable the establishments of Q management strategies that enforce priorities for different categories of application data. Thus this queuing enables voice data to have priority over transaction data which has priority over web data.

Match the description to the IP V6 addressing component
This part of the address is used by an organization to identify subnets: subnet ID
This network portion of the address is assigned by the provider: global routing prefix
This part of the address is the equivalent to the host portion of an IPV4 address: interface ID

Referred to the exhibit if host one were to transfer a file to the server what layers of the TCP/IP model would be used?
Application, transport, Internet, and network access layers
Explanation: topic 3.5.3
The TCP/IP model contains the application, transport, Internet, and network access layers. A file transfer uses the FTP application layer protocol. The data would move from the application layer through all of the layers of the model at across the network to the file server.

Match the characteristic to the forwarding method.
Always stored the entire frame: store and forward. Target.
Check the CRC before Forwarding: store and forward. target
Check the frame length before forwarding: store and forward. Target.
Has low latency: cut through. Target.
May forward rent frames: cut through. Target.
Begins forwarding when the destination address is received: cut through. Target.

Which two OSI model layers have the same functionality as two layers of the TCP/IP model
Network
Transport
Which PDU is processed when a host computer is De-encapsulating a message at the transport layer of the TCP/IP model
Segment
Which two statements describe the characteristics of fiber optic cable
Fiber optic cabling does not conduct electricity
Fiber optic cabling is primarily used as a backbone cabling
What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time
throughput

Referred to the exhibit what is the maximum possible throughput between the PC and the server?
128 kg bits per second
Which two acronyms represent the data a link sub layers that ethernet relies upon to operate
MAC
LLC
Although CMA/CD is still a feature of the ethernet wise and no longer necessary
The use of full duplex, capable layer two switches
A network team is comparing to apologies for connecting on a shared media. Which physical topology is an example of a hybrid topology
Extended star
What does a router do when it receives a layer two frame over the network medium
De encapsulates the frame
What routing table entry has a next hop address associated with a destination network
Remote routes
Why is NAT not needed in IPv6?
Any host or user can get a public IPB6 network address because the number of available IPv6 addresses is extremely large
Which term describes a field in the IPV four packet header that contains a unicast multicast or broadcast address
Destination, IPV4 address