Introduction
to Networks (Version 6.0) - ITN Chapter 3 Exam
1 What method can be used by two computers to ensure that
packets are not dropped because too much data is being sent too quickly?
encapsulation
flow control
access method
response timeout
2 What type of communication will send a message to all devices on a local area
network?
broadcast
multicast
unicast
allcast
3 What process is used to place one message inside another message for transfer
from the source to the destination?
access control
decoding
encapsulation
flow control
4 A web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack that
is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet
HTTP, TCP, IP, Ethernet
Ethernet, TCP, IP, HTTP
Ethernet, IP, TCP, HTTP
5 Which statement is correct about network protocols?
Network protocols define the type of hardware that is used and how it is
mounted in racks.
They define how messages are exchanged between the source and the
destination.
They all function in the network access layer of TCP/IP.
They are only required for exchange of messages between devices on remote
networks.
6 Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and
functions.
The TCP/IP network access layer has similar functions to the OSI network layer.
The OSI Layer 7 and the TCP/IP application layer provide identical
functions.
The first three OSI layers describe general services that are also provided by
the TCP/IP internet layer.
7 What is an advantage of using standards to develop and implement protocols?
A particular protocol can only be implemented by one
manufacturer.
Products from different manufacturers can interoperate
successfully.
Different manufacturers are free to apply different requirements when
implementing a protocol.
Standards provide flexibility for manufacturers to create devices that comply
with unique requirements.
8 What three application layer protocols are part of the TCP/IP protocol suite?
(Choose three.)
ARP
DHCP
DNS
FTP
NAT
PPP
9 What are proprietary protocols?
protocols developed by private organizations to operate on any vendor
hardware
protocols that can be freely used by any organization or
vendor
protocols developed by organizations who have control over their definition and
operation
a collection of protocols known as the TCP/IP protocol suite
10 What is an advantage of network devices using open standard protocols?
Network communications is confined to data transfers between devices from the
same vendor.
A client host and a server running different operating systems can successfully
exchange data.
Internet access can be controlled by a single ISP in each
market.
Competition and innovation are limited to specific types of products.
11 Refer to the exhibit. If Host1 were to transfer a file to the server, what
layers of the TCP/IP model would be used?
only application and Internet layers
only Internet and network access layers
only application, Internet, and network access layers
application, transport, Internet, and network access layers
only application, transport, network, data link, and physical
layers
application, session, transport, network, data link, and physical layers
12 Which three layers of the OSI model are comparable in function to the
application layer of the TCP/IP model? (Choose three.)
application
presentation
session
transport
data link
physical
network
13 At which layer of the OSI model would a logical address be encapsulated?
physical layer
data link layer
network layer
transport layer
14 Which PDU format is used when bits are received from the network medium by
the NIC of a host?
file
frame
packet
segment
15 Which PDU is processed when a host computer is de-encapsulating a message at
the transport layer of the TCP/IP model?
bits
frame
packet
segment
16 Refer to the exhibit. HostA is attempting to contact ServerB. Which two
statements correctly describe the addressing that HostA will generate in the
process? (Choose two.)
A packet with the destination IP address of RouterB.
A frame with the destination MAC address of SwitchA.
A packet with the destination IP address of RouterA.
A frame with the destination MAC address of RouterA.
A packet with the destination IP address of ServerB.
A frame with the destination MAC address of ServerB.
17 Which address does a NIC use when deciding whether to accept a frame?
source IP address
source MAC address
destination IP address
destination MAC address
source Ethernet address
18 What will happen if the default gateway address is incorrectly configured on
a host?
The host cannot communicate with other hosts in the local
network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default
gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
19 Which characteristic describes the default gateway of a host computer?
the logical address of the router interface on the same network as the host
computer
the physical address of the switch interface connected to the host
computer
the physical address of the router interface on the same network as the host
computer
the logical address assigned to the switch interface connected to the router
20 Match each description to its corresponding term. (Not all options are
used.)
21 Match the protocol function to the description while taking into
consideration that a network client is visiting a web site. (Not all options
are used.)
22 Match the description to the organization. (Not all options are used.)
Introduction
to Networks (Version 6.0) - ITN Chapter 3 Exam
1 What method can be used by two computers to ensure that
packets are not dropped because too much data is being sent too quickly?
encapsulation
flow control
access method
response timeout
2 What type of communication will send a message to all devices on a local area network?
broadcast
multicast
unicast
allcast
3 What process is used to place one message inside another message for transfer from the source to the destination?
access control
decoding
encapsulation
flow control
4 A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet
HTTP, TCP, IP, Ethernet
Ethernet, TCP, IP, HTTP
Ethernet, IP, TCP, HTTP
5 Which statement is correct about network protocols?
Network protocols define the type of hardware that is used and how it is mounted in racks.
They define how messages are exchanged between the source and the destination.
They all function in the network access layer of TCP/IP.
They are only required for exchange of messages between devices on remote networks.
6 Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
The TCP/IP network access layer has similar functions to the OSI network layer.
The OSI Layer 7 and the TCP/IP application layer provide identical functions.
The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.
7 What is an advantage of using standards to develop and implement protocols?
A particular protocol can only be implemented by one manufacturer.
Products from different manufacturers can interoperate successfully.
Different manufacturers are free to apply different requirements when implementing a protocol.
Standards provide flexibility for manufacturers to create devices that comply with unique requirements.
8 What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
ARP
DHCP
DNS
FTP
NAT
PPP
9 What are proprietary protocols?
protocols developed by private organizations to operate on any vendor hardware
protocols that can be freely used by any organization or vendor
protocols developed by organizations who have control over their definition and operation
a collection of protocols known as the TCP/IP protocol suite
10 What is an advantage of network devices using open standard protocols?
Network communications is confined to data transfers between devices from the same vendor.
A client host and a server running different operating systems can successfully exchange data.
Internet access can be controlled by a single ISP in each market.
Competition and innovation are limited to specific types of products.
11 Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
encapsulation
flow control
access method
response timeout
2 What type of communication will send a message to all devices on a local area network?
broadcast
multicast
unicast
allcast
3 What process is used to place one message inside another message for transfer from the source to the destination?
access control
decoding
encapsulation
flow control
4 A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet
HTTP, TCP, IP, Ethernet
Ethernet, TCP, IP, HTTP
Ethernet, IP, TCP, HTTP
5 Which statement is correct about network protocols?
Network protocols define the type of hardware that is used and how it is mounted in racks.
They define how messages are exchanged between the source and the destination.
They all function in the network access layer of TCP/IP.
They are only required for exchange of messages between devices on remote networks.
6 Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
The TCP/IP network access layer has similar functions to the OSI network layer.
The OSI Layer 7 and the TCP/IP application layer provide identical functions.
The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.
7 What is an advantage of using standards to develop and implement protocols?
A particular protocol can only be implemented by one manufacturer.
Products from different manufacturers can interoperate successfully.
Different manufacturers are free to apply different requirements when implementing a protocol.
Standards provide flexibility for manufacturers to create devices that comply with unique requirements.
8 What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
ARP
DHCP
DNS
FTP
NAT
PPP
9 What are proprietary protocols?
protocols developed by private organizations to operate on any vendor hardware
protocols that can be freely used by any organization or vendor
protocols developed by organizations who have control over their definition and operation
a collection of protocols known as the TCP/IP protocol suite
10 What is an advantage of network devices using open standard protocols?
Network communications is confined to data transfers between devices from the same vendor.
A client host and a server running different operating systems can successfully exchange data.
Internet access can be controlled by a single ISP in each market.
Competition and innovation are limited to specific types of products.
11 Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
only application and Internet layers
only Internet and network access layers
only application, Internet, and network access layers
application, transport, Internet, and network access layers
only application, transport, network, data link, and physical layers
application, session, transport, network, data link, and physical layers
12 Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
application
presentation
session
transport
data link
physical
network
13 At which layer of the OSI model would a logical address be encapsulated?
physical layer
data link layer
network layer
transport layer
14 Which PDU format is used when bits are received from the network medium by the NIC of a host?
file
frame
packet
segment
15 Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
bits
frame
packet
segment
16 Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)
A packet with the destination IP address of RouterB.
A frame with the destination MAC address of SwitchA.
A packet with the destination IP address of RouterA.
A frame with the destination MAC address of RouterA.
A packet with the destination IP address of ServerB.
A frame with the destination MAC address of ServerB.
17 Which address does a NIC use when deciding whether to accept a frame?
source IP address
source MAC address
destination IP address
destination MAC address
source Ethernet address
18 What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
19 Which characteristic describes the default gateway of a host computer?
the logical address of the router interface on the same network as the host computer
the physical address of the switch interface connected to the host computer
the physical address of the router interface on the same network as the host computer
the logical address assigned to the switch interface connected to the router
20 Match each description to its corresponding term. (Not all options are used.)
21 Match the protocol function to the description while taking into consideration that a network client is visiting a web site. (Not all options are used.)
22 Match the description to the organization. (Not all options are used.)
No comments:
Post a Comment