Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

More Create Blog Sign In

HOME SUBJECTS CCNA's ABOUT US SHARE IT REQUEST IT CONTACT US DISCLAIMER PRIVACY POLICY TERMS & CONDITIONS

Buy me a Drink or Coffee Friday, February 26, 2021 What are you looking for?
Thanks a lot !
Data Communications and Networking 1 Search

Data Communications and Networking 1

Module DescriptionThis course covers configuring and implementation of LAN networks.

When the command “Switch(config)# hostname EaSt2+56” is


entered in a Cisco IOS device using the CLI, what will be EaSt-2+56(config)# SUBJECTS
Thanks for Visiting !
returned in the CLI?
2D 3D Digital Animation

What is a group of web pages that groups of individuals can Accounting Information System
Wiki
edit and view together called?
637,509 Accounting Research Methods
The farther you are from the central office when utilizing a slower
DSL connection, the ___ connection speed Advanced Database Management Systems

Which type of network design combines voice, video, and Animation Project (MAC)
a converged network
data on the same communication channel?
Application Development and Emerging
What type of information would be found on a logical Technology
IP addressing scheme
topology diagram?
Application Life cycle Management
Which type of traffic must receive the highest priority from VoIP Art Appreciation
QoS?

What is encrypted with the enable secret command? the privileged executive mode password Audio and Video Production

Biological Science
·         IP phone
Calculus - Based Physics 1
Which devices would be considered end devices on a ·         Tablet computer
network? (Choose four.) Calculus - Based Physics 2
·         Server

·         Printer Calculus 1

An ____ is a private connection of LANs and WANs that Cisco - CPP - Advanced Programming in
belongs to an organization, and is designed to be accessible intranet C++
only by the members and employees of the organization, or
others with authorization Cisco - Introduction to Cybersecurity
·         it can rapidly adapt to the failure of network Cisco - Introduction to Packet Tracer
devices and communication links

For which three reasons was a packet switched ·         Data packets can travel through the network Cloud Computing and Internet of Things
connectionless data communications technology used when using multiple different paths
developing the Internet (Choose three.) Computer Aided Drawing
·         Network devices dynamically decide on the
best available path to forward each packet. Computer Programming 1

In which scenario would the use of a WISP be Computer Programming 2


a farm in a rural area without wired broadband access
recommended?
Computing Fundamentals / Introduction to
Computing
Which of the following are business-class Internet connection Leased lines
technologies normally supplied by a service provider?
(Choose two.) Metro Ethernet Current Trends and Issues

Data Analysis
Why would a technician enter the command copy startup- to copy an existing configuration into RAM
config running config? Data Communications and Networking 1
A ____ network is able to expand to accept new devices and
applications without affecting performance. scalable
Data Communications and Networking 2

Data Communications and Networking 3


What is a network infrastructure that provides access to other
LAN
networks over a wide geographic area? Data Communications and Networking 4

A network where voice, video, and data move over the Data Structures and Algorithms
What is a converged network?
same infrastructure
Database Management System 1 (Oracle)

An administrator has just changed the IP address of an Nothing must be done. Changes to the configuration Database Management System 2 (Oracle
interface on an IOS device. What else must be done in order on an IOS device take effect as soon as the command
10g Admin)
to apply those changes to the device? is typed correctly and the Enter key has been pressed.
Developmental Psychology
A data center has recently updated a physical server to host
multiple operating systems on a single CPU. The data center Differential Equation
can now provide each customer with a separate web server
virtualization
without having to allocate an actual discrete server for each Discrete Mathematics
customer. What is the network trend that is being
implemented by the data center in this situation? Electric Circuits Theory 2
What is the Cisco IOS? The operating system for the Cisco network device
Electronic Devices and Circuits

In which scenario would the use of a WISP be recommended a farm in rural area without wired broadband access Environmental Science

Euthenics 1
During a routine inspection, a technician discovered that
software that was installed on a computer was secretly spyware
collecting data about websites that were visited by users of Euthenics 2
the computer. Which type of threat is affecting this computer?
Fundamentals of Database System
A technician configures a switch with these commands:
Fundamentals of Mixed Signals and Sensors
SwitchA(config)# interface vlan 1

SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0 SVI Income Taxation

SwitchA(config-if)# no shutdown Individual and Dual Sports


What is the technician configuring?
Information Assurance and Security 1

Where is the configuration used during startup on Cisco IOS Information Assurance and Security 2
Startup config
devices located?
Information Management
The network provides predictable levels of service to
Which statement describes a network that supports QoS?
different types of traffic
Inquiries, Investigation, and Immersion

What is the primary defense against unauthorized remote Integrative Programming and Technology 1
Configuring a VTY password
access to network devices?
Internet Marketing and Entrepreneurship
How is the Cisco IOS generally accessed and navigated? Through the CLI using a terminal emulator
Introduction to Human Computer

What are two benefits of collaboration and video-on-demand providing better social media opportunities Introduction to Multimedia
applications? (Choose two.)
providing a richer e-learning environment Introduction to Packet Tracer

What is a wiki? a web page that groups of people can edit and review Introduction to Psychology

IT Capstone Project 1
A network that can reroute traffic in case of device
What is a fault-tolerant network?
failure IT Capstone Project 2

Which technology would be best to provide a home user with DSL IT Practicum (486 hrs)
a highspeed, always-on Internet connection?
Life and Works of Jose Rizal
Confidentiality
What are the primary requirements of information security? Living in the IT Era
Integrity
(Choose three.)
Availability Load Testing

Macroeconomics and Theory Practice


What command will display a list of keywords available for
Switch# show?
viewing the status of an IOS switch?
Mathematics in the Modern World

To save time, IOS commands may be partially entered and Network Security
Tab
then completed by typing which key or key combination?
NSTP 1
What is initially entered at the CLI of the Cisco IOS when
Command NSTP 2
typing a command sequence?

Object Oriented Programming


Which device acts as gateway to allow hosts to send traffic to
local router
remote IP networks? Pagsasaling Pampanitikan

Which statement describes a feature of an IOS host name Philippine Literature


It does not allow spaces
configuration?
Philippine Popular Culture

Why would a network administrator use the CLI of the Cisco Physical Fitness
to add a password to a Cisco network device
IOS?
Physiological Psychology
What type of connection to a Cisco IOS switch is used to
Console port
make the initial configuration? Practical Research

Principles of Operating System and


A network administer has forgotten the argument of an IOS
command. How would the administrator get help from the Type the command and then press the? key Application
IOS CLI to complete the command correctly?
Purposive Communication 2

Which of the following are disadvantages of peer-to-peer Scalability Quantitative Methods


networking? (Choose two.)
No centralized administration
Readings in Philippine History

Which of the following are examples of proprietary protocols?


Novell NetWare Rhythmic Activities
(Choose two.) AppleTalk Science, Technology and Society
flow control
Which two message timing mechanisms are used in data Screenwriting (MAC)
communication? (Choose two.)
response timeout
Social and Professional Issues
Which application layer protocol allows users on one network
to reliably transfer files to and from a host on another FTP
Software Engineering 1
network?
Software Engineering 2

providing the rules required for a specific type of Statistical Analysis with Software
What is the purpose of protocols in data communications?
communication to occur Application

What organization is responsible for the overall management IAB Strategic Management
and development of Internet standards?
System Administration and Maintenance
What will a network administrator use to modify a IOS
configuration on a Cisco router? System Analysis and Design (PL/SQL Prog)
Which message delivery option is used when all devices
broadcast System Integration and Architecture 1
need to receive the same message simultaneously?

Team Sports
A ___ address is defined as a reserved address that routes
loopback
packets back to the host Technopreneurship

·         frame header The Contemporary World


Which two components are added to the PDU at the network
access layer? (Choose two.) Understanding the Self
·         Trailer

Unified Functional Testing


What is the transport layer PDU? Segment
Web Application Development 1
Which is a function of the Logical Link Control (LLC) to identify which network layer protocol is being used
sublayer? Web Application Development 2
What is and advantage of using standards to develop and Products from different manufacturers can Web Design
implement protocols? interoperate successfully
Web Enhanced Animation Graphics
Which organization develops the 802 family of standard for
IEEE
wired and wireless LANs and MANs? Web Systems Technologies

·         Channel
Which of the following elements do both human and
·         Source
computer communication systems have in common? NOTE:
(Choose three.) ·         Receiver
* Control + f
* Only search the key words of the
·         how connection between nodes appears to
questions
Which two factors influence the method that is used for the data link layer
media access control? (Choose two.) * To maximize the user experience, use
·         how nodes share the media desktop

* to find our website in google search just


In fiber optic meda, the signals are represented as patterns
light type "finditsource" (without spacing)
of ­

*Don't worry we update our contents every


What is an advantage of using standards to develop and Products from different manufacturers can
now and then.. so keep on checking them..
implement protocols? interoperate successfully
thank you!

What happens when two devices on the same subnet are


The host portion of the IP addresses will be different
communicating?

Which message timing factor impacts how much information


Flow control
can be sent and the speed at which it can be delivered
Navigate

What is the name given to a one-to-many message delivery ►  2023 (26)


Multicast
option?
►  2022 (17)

Which of the following OSI model layers have the same Data link ▼  2021 (56)
functionality as the network access layer in the TCP/IP ►  December (4)
model? (Choose two.) Physical
►  September (4)
·         The throughput is predictable ►  July (4)
Which two statements are true of the deterministic access
method?(Choose two.) ·         Devices take turns transmitting ►  June (1)
►  April (8)
Which logical address is used for delivery of data to a remote
destination IP address
network? ►  March (28)
▼  February (7)
What command will prevent all unencrypted passwords from (config) # service password-encryption
displaying in plain text in a configuration file?
NSTP 2
Introduction to Multimedia
What type of protocol describes communication over a data
link and the physical transmission of data on the network Network access protocol Computer Programming 2
media?
Data Communications and
Networking 1
Which organization is responsible for the standard that IEEE
defines Media Access Control for wired Ethernet? Data Analysis
Which TCP/IP model layer is responsible for providing the Discrete Mathematics
Internet
best path through the network?
Calculus-Based Physics 2
·         Only some aspects of the router
configuration can be viewed
Which two statements are true regarding the user EXEC
mode? (Choose two.) ·         This is the default mode on an unconfigured
router when first powered up.
Follow Us for More Updates

They define how messages are exchanged between Followers (8)


Which statement is correct about network protocols?
the sources and the destination

Which OSI reference model layer is responsible for common


representation of the data transferred between application Presentation
layer services?

·         UDP Follow


Which of the following TCP/IP protocols exist at the transport
layer of the TCP/IP reference model? (Choose two.) ·         TCP

·         message size Popular Posts


What three functions are defined by network protocols to
allow communication between known source and destination ·         data encoding
IP addresses? (Choose three.)
NSTP 2
·         delivery options  NSTP 2

Life and Works of Jose Rizal


What happens to frames that are too long or too short for the
They are dropped. GE6300 Life and Works of Jose Rizal
channel used?

Rhythmic Activities
What name is given to a group of interrelated protocols
Protocol suite PHYED6102 - Rhythmic Activities 
necessary to perform a communication function?
Calculus 1
Which organization is responsible for developing MATH6100  Calculus 1
The Telecommunications Industry Association (TIA)
communications standards for Voice over IP (VoIP) devices?

The branch sites are connected to a central site


What is a characteristic of a WAN hub-and-spoke topology?
through point-point links
Physical Fitness
Which statement describes a characteristic of the frame
They vary depending on protocols
 PHYED 6101 - Physical Fitness
header fields of the data link layer?

Why would a network administrator use the CLI of the Cisco


to add a password to a Cisco network device
IOS?

The kernel provisions hardware resources to meet


What is the function of the kernel of an operating software?
software requirements.

·         lacks centralized administration


A company is contemplating whether to use a client/server or
a peer-to-peer network. What are three characteristics of a ·         less cost to implement
peer-to-peer network? (Choose three.)
·         easy to create

·         They are the interface between humans and


the communication network.
What are two functions of end devices on a network?
(Choose two.)
·         They originate the data that flows through
the network.

·         it can rapidly adapt to the failure of network


devices and communication links
For which three reasons was a packet switched
·         Network devices dynamically decide on the
connectionless data communications technology used when
best available path to forward each packet.
developing the Internet (Choose three.)
·         Data packets can travel through the network
using multiple different paths

Which area of the network would a college IT staff most likely


have to redesign as a direct result of many students bringing
wireless LAN
their own tablets and smartphones to school to access
school

What process is used to place one message inside another


encapsulation
message for transfer from the source to the destination?

Which procedure is used to access a Cisco 2960 switch


Use the console port to locally access the switch from
when performing an initial configuration in a secure
a serial or USB interface of the PC.
environment?

A web client is sending a request for a webpage to a web


server. From the perspective of the client, what is the correct
HTTP, TCP, IP, Ethernet
order of the protocol stack that is used to prepare the request
for transmission?

Which two engineering organizations define open standards


International Telecommunication Union (ITU)
and protocols that apply to the data link layer?

Which type of network design combines voice, video, and


a converged network
data on the same communication channel?

An administrator has just changed the IP address of an Nothing must be done. Changes to the configuration
interface on an IOS device. What else must be done in order on an IOS device take effect as soon as the command
to apply those changes to the device? is typed correctly and the Enter key has been pressed.

A network administrator needs to keep the user ID,


password, and session contents private when establishing
SSH
remote CLI connectivity with a switch to manage it. Which
access method should be chosen?

·         the distance the selected medium can


successfully carry a signal
What two criteria are used to help select a network medium
from various network media? (Choose two.)
·         the environment where the selected medium
is to be installed

Which organization develops the 802 family of standard for


IEEE
wired and wireless LANs and MANs?

An administrator measured the transfer of usable data across


a 100 Mb/s physical channel over a given period of time and
latency
obtained 60 Mb/s. Which kind of measurement did the
administrator obtain

What type of address is 01-00-5E-0A-00-02? an address that reaches a specific group of hosts

·         response timeout


Which two message timing mechanisms are used in data
communication? (Choose two.) ·         flow control

What is a characteristic of a contention-based access


It is as nondeterministic method
method?

The Ethernet ___ sublayer is responsible for communicating


MAC
directly with the physical layer.

·         Intermediary devices direct the path of the


Which two statements describe intermediary devices? data.
(Choose two.)
·         Intermediary devices connect individual
hosts to the network.

To save time, IOS commands may be partially entered and


Tab
then completed by typing which key or key combination?

What type of delivery uses data link layer addresses? local delivery

What is the purpose of the physical link control field in a data


to establish the media link
link layer header?

In which scenario would the use of a WISP be


a farm in a rural area without wired broadband access
recommended?

A  ___ network is able to expand to accept new devices and


scalable
applications without affecting performance.

Which PDU is processed when a host computer is de-


encapsulating a message at the transport layer of the TCP/IP segment
model?

Which statement describes a feature of an IOS host name


It does not allow spaces
configuration?

What will a network administrator use to modify a


IOS
configuration on a Cisco router?

Which interface command must be entered in a Layer 3


no switchport
switch before IPv4 address can be assigned to the interface?

Which logical address is used for delivery of data to a remote


destination IP address
network?

Which two Internet connection options do not require that ·         Cellular
physical cables be run to the building? (Choose two.) ·         satellite

A router has a valid operating system and a configuration file


stored in NVRAM. The configuration file contains an enable
user EXEC mode
secret password but no console password. When the router
boots up, which mode will display?

An ___ is a private connection of LANs and WANs that


belongs to an organization, and is designed to be accessible
intranet
only by the members and employees of the organization, or
others with authorization

What type of communication will send a message to all


broadcast
devices on a local area network?

Which two connection options provide an always-on, high- ·         Cable


bandwidth Internet connection to computers in a home
office? (Choose two. ·         DSL

Which command or key combination allows a user to return


exit
to the previous level in the command hierarchy?

What are two benefits of collaboration and video-on-demand ·         providing better social media opportunities
applications? (Choose two.) ·         providing a richer e-learning environment

When is a wired connection preffered to a wireless when the end-user device will run an application that
connection by an end-user device? requires a dedicated connection to the network

What method can be used by two computers to ensure that


packets are not dropped because too much data is being flow control
sent too quickly?

Which device performs the function of determining the path


a router
that messages should take through internet works?

During a routine inspection, a technician discovered that


software that was installed on a computer was secretly
spyware
collecting data about websites that were visited by users of
the computer. Which type of threat is affecting this computer

An employee at a branch office is creating a quote for a


customer. In order to do this, the employee needs to access
confidential pricing information from internal servers at the an intranet
Head Office. What type of network would the employee
access?

hich term describes the state of a network when the demand


congestion
on the network resources exceeds the available capacity?

Which action is performed by a client when establishing


The client sends a synchronization segment to begin
communication with a server via the use of UDP at the
the session
transport layer?

Which term defines the processing capabilities of a switch by


forwarding rate
rating how much data can be processed per second?

·         it adds a header and trailer to form an OSI


Which two functions or operations are performed by the MAC Layer 2 PDU
sublayer? (Choose two.)
·         It is responsible for Media Access Control

·         directing data packets to destination hosts


on other networks
What are two functions that are provided by the network
layer? (Choose two.)
·         providing end devices with a unique network
identifier

During the boot process, in what memory location will the


router bootstrap program look for the IOS image if a TFTP flash
server is not used?

Which destination address is used in an ARP request frame? FFFF.FFFF.FFFF

Which two files are loaded into RAM by the router when it ·         startup configuration
boots? (Choose two.) ·         IOS image

On Ethernet networks, the hexadecimal address FF-FF-FF-


broadcast
FF-FF-FF represent the___ MAC address

The MTU is passed to the network layer by the data


How does the network layer use the MTU value?
link layer

When transporting data from real-time applications, such as


streaming audio and video, which field in the IPv6 header
Flow Label
can be used to inform the routers and switches to maintain
the same path for the packets in the same conversation?

During troubleshooting procedures, from which location will


ROM
most Cisco routers load a limited IOS

When a client connects to an HTTP server by the use of a


randomly generated source port number, what destination the original source port number that was randomly
port number will the HTTP server use when building a generated by the client
response?

Which entities are involve in a temporary communication that


applications
is established by the transport layer?

Which feature on a Cisco router permits the forwarding of


gateway of last resort
traffic for which there is no specific route?

A collision fragment, also known as a ___ frame, is a frame


runt
of fewer than 64 bytes in length.

Which value, that is contained in an IPv4 header field, is


Time-to-Live
decremented by each router that receives a packet?

Within a production network, what is the purpose of The default gateway address is used to forward
configuring a switch with a default gateway address? packets originating from the switch to remote networks

What is the command netstat –r used for? to display the host routing table

What is an advantage of UDP over TCP? UDP communication requires less overhead

·         Source Port


Which three fields are used in a UDP segment header?
·         Checksum
(Choose three.)
·         Length

What happens if part of an FTP message is not delivered to


The part of the FTP message that was lost is re-sent
the destination?

Which address is used as a destination address on a


FF-FF-FF-FF-FF-FF
broadcast Ethernet frame?

Which number or set of numbers represents a socket? 192.168.1.1:80

What is the purpose of using a source port number in a TCP to keep track of multiple conversations between
communication? devices

A user is unable to access the company server from a


computer. On issuing the ipconfig command, the user finds
experimental
that the IP address of the computer is displayed as
169.254.0.2. What type of address is this?

·         The first 6 hexadecimal digits of a MAC


address represent the OUI.

What is true about the Ethernet MAC address? (Choose ·         The vendor is responsible for assigning the
three.) last 24 bits of the MAC address.

·         The MAC address is also known as a


burned-in address.

Which statement is true about an interface that is configured


A link-local IPv6 address is automatically
with the IPv6 address command?

A network administrator notices that the default gateway


devices sends an ICMP Redirect message to the workstation To notify the workstation, that another router on the
when the workstation tries to connect to file server on same network, is the better defaultgateway to reach
another network. What is the purpose for this ICMP the remote server
message?

Which application use UDP as the transport layer protocol? SMTP

Which standard specifies the Ethernet MAC sublayer


IEEE 802.3
functionality in a computer NIC?

Public IP addresses must be unique across the entire


Which statement accurately describes public IP addresses?
Internet

The last host address on the 10.15.25.0/24 network is 10.15.25.254

·         Error detection


What are the primary functions associated with data
encapsulation at the Ethernet MAC sublayer? (Choose ·         Frame delimiting
three.)
·         Addressing

The 8-bit binary value for 41 is 00101001

What is the name given to the Ethernet MAC sublayer PDU? Frame

Which address is a multicast MAC address? 01-00-5E-00-00-C8

The shortest compressed format of the IPv6 address 2001:


2001:DB8:0:1470::200
0DB8:0000:1470:0000:0000:0000:0200 is

Which field in an Ethernet frame is used for error detection? Frame Check Sequence

·         Physical
At which layers of the OSI model does Ethernet function?
(Choose two.) ·         Data link

What is the minimum and maximum Ethernet frame size as


64 bytes – 1518 bytes
defined by IEEE 802.3?

What happens when a data collision occurs on an Ethernet


All devices stop transmitting and try again later.
bus?

Your organization is issued the IPv6 prefix of


2001:0000:130F::/48 by your service provider. With this
128
prefix, how many bits are available for your organization to
create subnetworks?

Which type of IPv6 address is not routable and used for


link-local address
communication on a single subnet?

Which statement is true about an interface that is configured


A link-local IPv6 address is automatically
with the IPv6 address command?

·         Directed broadcasts are intended for all


hosts on a local or remote network
Which two statement describe broadcast transmissions on a
wired network? (Choose two.)
·         Limited broadcasts are only intended for the
hosts on a local network

Which entities are involved in a temporary communication


applications
that is established by the transport

Standards provide flexibility for manufacturers to create Products from different manufacturers can
devices that comply with unique requirements interoperate successfully

A user who is unable to connect to the file server contacts


the help desk. The helpdesk technician asks the user to ping to test if the workstation can communicate on the
the IP address of the default gateway that is configured on network
the workstation. What is the purpose for this command?

·         Network
What are the parts of an IPv4 address? (Choose two.)
·         Host

A client is downloading a large file from a server using FTP.


The FTP client responds to the server with a smaller
Many of the segments are lost during transit. What will most
window size in the TCP header.
likely happen?

The TCP/IP application layer effectively consists of which


Application, presentation, session
three OSI layers?

·         Identifying the proper application for each


communication stream

·         Segmenting data for and reassembling


What are the primary purposes of the transport layer? segmented data into streams of application
(Choose three.) data at the destination

·         Tracking the individual communication


between applications on the source and
destination hosts

What is a characteristic of UDP? What range of ports can


either be used by TCP or UDP to identify the requested 1024 to 49151
service on the destination device or as a client source port?

What is assigned by the transport layer to identify an


Port
application or service?

What does UDP do when receiving messages that are more UDP reassembles that data in the order it was
than one datagram in length? received and passes it to the application.

Which TCP header field specifies the number of bytes that


Window size
can be accepted before an acknowledgement is required?

·         SMTP
What three protocols do email users and servers use to
·         POP3
process email? (Choose three.)
·         IMAP4

What is an advantage that UDP has over TCP? Low overhead

at February 26, 2021


Labels: Educational Source

4 comments:

find it source September 13, 2021 at 5:36 AM

Your most welcome :)

Reply

Wicky Bro October 22, 2021 at 11:27 PM

It is the best website for all of us. It provides all types of software and apps which we need. You can visit this
website.
pcproductkey.co
usb-redirector-technician-edition-crack
universal-keygen-generator-crack

Reply

abbas December 2, 2021 at 9:24 PM

Very Nice Post...usb-redirector-client-crack

Reply

Lumion Pro I am very impressed with your post because this post is very beneficial for me January 28, 2022 at
6:16 AM

I like your all post. You have done really good work. Thank you for the information you provide, it helped me a lot.
wahabtech.net I hope to have many more entries or so from you.
Very interesting blog.
USB Redirector Client Crack

Reply

To leave a comment, click the button below to sign in with Google.

SIGN IN WITH GOOGLE

Newer Post Home Older Post

Subscribe to: Post Comments (Atom)

Powered by Blogger.

You might also like