Download as pdf or txt
Download as pdf or txt
You are on page 1of 63

https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.

html

It does not allow spaces Which statement describes a feature of an IOS host name configuration?
a farm in a rural area without
wired broadband access In which scenario would the use of a WISP be recommended?
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
virtualization customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
-Data packets can travel through
the network using multiple
different paths
-it can rapidly adapt to the For which three reasons was a packet switched connectionless data
failure of network devices and communications technology used when developing the Internet (Choose
communication links three.)
-Network devices dynamically
decide on the best available
path to forward each packet
During a routine inspection, a technician discovered that software that
was installed on a computer was secretly collecting data about websites
spyware that were visited by users of the computer. Which type of threat is
affecting this computer?
Which technology would be best to provide a home user with a
DSL highspeed, always-on Internet connection?
Which type of network design combines voice, video, and data on the
a converged network same communication channel?
What type of connection to a Cisco IOS switch is used to make the initial
Console port configuration?
The network provides
predictable levels of service to Which statement describes a network that supports QoS?
different types of traffic
-Integrity
-Availability What are the primary requirements of information security? (Choose
-Confidentiality three.)
An ____ is a private connection of LANs and WANs that belongs to an
Intranet organization, and is designed to be accessible only by the members and
employees of the organization, or others with authorization
- Scalability Which of the following are disadvantages of peer-to-peer networking?
- No centralized administration (Choose two.)
When the command “Switch(config)# hostname EaSt2+56” is entered in a
EaSt-2+56(config)# Cisco IOS device using the CLI, what will be returned in the CLI?
The operating system for the
Cisco network device What is the Cisco IOS?
-providing a richer e-learning

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

environment
- providing a richer e-learning What are two benefits of collaboration and video-on-demand
environment applications? (Choose two.)
- providing better social media
opportunities
- IP phone
-Printer
-Tablet computer Which devices would be considered end devices on a network? (Choose
-Server four.)
A network that can reroute
traffic in case of device failure What is a fault-tolerant network?
a web page that groups of
people can edit and review What is a wiki?
The farther you are from the central office when utilizing a DSL
slower connection, the ___ the connection speed
Through the CLI using a terminal
emulator How is the Cisco IOS generally accessed and navigated?
Nothing must be done. Changes
to the configuration on an IOS An administrator has just changed the IP address of an interface on an IOS
device take effect as soon as the device. What else must be done in order to apply those changes to the
command is typed correctly and device?
the Enter key has been pressed
What is initially entered at the CLI of the Cisco IOS when typing a
Command command sequence?
To save time, IOS commands may be partially entered and then completed
Tab by typing which key or key combination?
the privileged executive mode
password What is encrypted with the enable secret command?
What is a network infrastructure that provides access to other networks
SAN over a wide geographic area?
Which device acts as gateway to allow hosts to send traffic to remote IP
local router networks?
What command will display a list of keywords available for viewing the
Switch# show? status of an IOS switch?
What is the primary defense against unauthorized remote access to
Configuring a VTY password network devices?
to add a password to a Cisco
network device Why would a network administrator use the CLI of the Cisco IOS?
Startup config Where is the configuration used during startup on Cisco IOS devices
located?
What is a group of web pages that groups of individuals can edit and view
Wiki together called?
A technician configures a switch with these commands:

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

SwitchA(config)# interface vlan 1


SVI SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
A network administer has forgotten the argument of an IOS command.
Type the command and then How would the administrator get help from the IOS CLI to complete the
press the? key command correctly?
IP addressing scheme What type of information would be found on a logical topology diagram?
- Metro Ethernet Which of the following are business-class Internet connection
- Leased lines technologies normally supplied by a service provider? (Choose two.)
VoIP Which type of traffic must receive the highest priority from QoS?
to copy an existing configuration Why would a technician enter the command copy startup-config running
into RAM config?
A network where voice, video,
and data move over the same What is a converged network?
infrastructure
A ___ network is able to expand to accept new devices and applications
scalable without affecting performance.
Which TCP/IP model layer is responsible for providing the best path
Internet through the network?
Which organization is responsible for the standard that defines Media
IEEE Access Control for wired Ethernet?
Products from different What is and advantage of using standards to develop and implement
manufacturers can interoperate protocols?
successfully
providing the rules required for
a specific type of What is the purpose of protocols in data communications?
communication to occur
What command will prevent all unencrypted passwords from displaying in
(config) # service password- plain text in a configuration file?
encryption
The host portion of the IP
addresses will be different What happens when two devices on the same subnet are
communicating?
Which message timing factor impacts how much information can be sent
Flow control and the speed at which it can be delivered?
- how connection between
nodes appears to the data link Which two factors influence the method that is used for media access
layer control? (Choose two.)
- how nodes share the media
- The throughput is predictable
- Devices take turns transmitting Which two statements are true of the deterministic access method?
(Choose two.)

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

loopback A ___ address is defined as a reserved address that routes packets back to
the host
What type of protocol describes communication over a data link and the
Network access protocol physical transmission of data on the network media?
Segment What is the transport layer PDU?
destination IP address Which logical address is used for delivery of data to a remote network?
What organization is responsible for the overall management and
IAB development of Internet standards?
- Data link Which of the following OSI model layers have the same functionality as
-Physical the network access layer in the TCP/IP model? (Choose two.)
Which application layer protocol allows users on one network to reliably
FTP transfer files to and from a host on another network
light In fiber optic meda, the signals are represented as patterns of
IOS What will a network administrator use to modify a configuration on a
Cisco router?
- This is the default mode on an
unconfigured router when first
powered up. Which two statements are true regarding the user EXEC mode? (Choose
- Only some aspects of the two.)
router configuration can be
viewed
- data encoding
- message size What three functions are defined by network protocols to allow
- delivery options communication between known source and destination IP addresses?
(Choose three.)
-TCP Which of the following TCP/IP protocols exist at the transport layer of the
-UDP TCP/IP reference model? (Choose two.)
Which organization develops the 802 family of standard for wired and
IEEE wireless LANs and MANs?
The Telecommunications Which organization is responsible for developing communications
Industry Association (TIA) standards for Voice over IP (VoIP) devices?
What name is given to a group of interrelated protocols necessary to
Protocol suite perform a communication function?
-Novell NetWare
- AppleTalk Which of the following are examples of proprietary protocols? (Choose
two.)
Products from different
manufacturers can interoperate What is an advantage of using standards to develop and implement
successfully protocols?
They are dropped. What happens to frames that are too long or too short for the channel
used?
Which OSI reference model layer is responsible for common
Presentation representation of the data transferred between application layer services?

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

to identify which network layer


protocol is being used Which is a function of the Logical Link Control (LLC) sublayer?
-Receiver
-Source Which of the following elements do both human and computer
-Channel communication systems have in common? (Choose three.)
-response timeout Which two message timing mechanisms are used in data communication?
- flow control (Choose two.)
Multicast What is the name given to a one-to-many message delivery option?
They define how messages are
exchanged between the sources Which statement is correct about network protocols?
and the destination
Which message delivery option is used when all devices need to receive
broadcast the same message simultaneously?
- Trailer Which two components are added to the PDU at the network access
-frame header layer? (Choose two.)
The branch sites are connected
to a central site through point- What is a characteristic of a WAN hub-and-spoke topology?
point links
-They are the interface between
humans and the communication
network. What are two functions of end devices on a network? (Choose two.)
-They originate the data that
flows through the network
Which device performs the function of determining the path that
a router messages should take through internet works?
A network administrator needs to keep the user ID, password, and session
SSH contents private when establishing remote CLI connectivity with a switch
to manage it. Which access method should be chosen?
to identify which network layer Which is a function of the Logical Link Control (LLC) sublayer?
protocol is being used
to identify which network layer
protocol is being used Which is a function of the Logical Link Control (LLC) sublayer?
The host portion of the IP
addresses will be different What happens when two devices on the same subnet are
communicating?
They vary depending on Which statement describes a characteristic of the frame header fields of
protocols the data link layer?
A___ network is able to expand to accept new devices and applications
scalable without affecting performance.
The network provides
predictable levels of service to Which statement describes a network that supports QoS?
different types of traffic
Products from different

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

manufacturers can interoperate What is an advantage of using standards to develop and implement
successfully protocols?
An administrator measured the transfer of usable data across a 100 Mb/s
Latency physical channel over a given period of time and obtained 60 Mb/s. Which
kind of measurement did the administrator obtain
Which term describes the state of a network when the demand on the
congestion network resources exceeds the available capacity?
-The throughput is predictable
-Devices take turns transmitting Which two statements are true of the deterministic access method?
(Choose two.)
local delivery What type of delivery uses data link layer addresses?
The kernel provisions hardware
resources to meet software What is the function of the kernel of an operating software?
requirements.
-This is the default mode on an
unconfigured router when first
powered up. Which two statements are true regarding the user EXEC mode? (Choose
-Only some aspects of the router two.)
configuration can be viewed
providing the rules required for
a specific type of What is the purpose of protocols in data communications?
communication to occur
Which area of the network would a college IT staff most likely have to
wireless LAN redesign as a direct result of many students bringing their own tablets and
smartphones to school to access school resources?
It is as nondeterministic method What is a characteristic of a contention-based access method?
-Intermediary devices direct the
path of the data.
-Intermediary devices connect Which two statements describe intermediary devices? (Choose two.)
individual hosts to the network.
-how connection between nodes
appears to the data link layer Which two factors influence the method that is used for media access
-how nodes share the media control? (Choose two.)
when the end-user device will
run an application that requires When is a wired connection preffered to a wireless connection by an end-
a dedicated connection to the user device?
network
A router has a valid operating system and a configuration file stored in
user EXEC mode NVRAM. The configuration file contains an enable secret password but no
console password. When the router boots up, which mode will display?
an address that reaches a What type of address is 01-00-5E-0A-00-02?
specific group of hosts
-satellite Which two Internet connection options do not require that physical cables

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-cellular be run to the building? (Choose two.)


-DSL Which two connection options provide an always-on, high-bandwidth
-cable Internet connection to computers in a home office? (Choose two.)
Which interface command must be entered in a Layer 3 switch before IPv4
no switchport address can be assigned to the interface?
A web client is sending a request for a webpage to a web server. From the
HTTP, TCP, IP, Ethernet perspective of the client, what is the correct order of the protocol stack
that is used to prepare the request for transmission?
What type of communication will send a message to all devices on a local
broadcast area network?
Use the console port to locally
access the switch from a serial Which procedure is used to access a Cisco 2960 switch when performing
or USB interface of the PC. an initial configuration in a secure environment?
-less cost to implement A company is contemplating whether to use a client/server or a peer-to-
-easy to create peer network. What are three characteristics of a peer-to-peer network?
-lacks centralized administration (Choose three.)
Nothing must be done. Changes
to the configuration on an IOS
device take effect as soon as the An administrator has just changed the IP address of an interface on an IOS
command is typed correctly and device. What else must be done in order to apply those changes to the
the Enter key has been pressed. device?
-the distance the selected
medium can successfully carry a What two criteria are used to help select a network medium from various
signal network media? (Choose two.)
-the environment where the
selected medium is to be
installed
Which PDU is processed when a host computer is de-encapsulating a
segment message at the transport layer of the TCP/IP model?
What process is used to place one message inside another message for
encapsulation transfer from the source to the destination?
Which command or key combination allows a user to return to the
exit previous level in the command hierarchy?
The Ethernet ___ sublayer is responsible for communicating directly with
MAC the physical layer.

Data Comms and Networking 1 Final Quiz 1


Which two components are added to the PDU at the network access layer? (Choose two.) -Trailer

-frame header

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What three functions are defined by network protocols to allow communication between known
source and destination IP addresses? (Choose three.)
-delivery options
-message size
-data encoding

Which statement is correct about network protocols?


-They define how messages are exchanged between the sources and the destination

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

Answer: IEEE

Which logical address is used for delivery of data to a remote network? Answer:

destination IP address

What will a network administrator use to modify a configuration on a Cisco router? -IOS

What is an advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout

What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
-(config) # service password-encryption

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What happens when two devices on the same subnet are communicating? -The

host portion of the IP addresses will be different

Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast

Which is a function of the Logical Link Control (LLC) sublayer?


-to identify which network layer protocol is being used

A ______ address is defined as a reserved address that routes packets back to the host

-loopback

What are the parts of an IPv4 address? (Choose two.)


-Host
-Network

What is the purpose of protocols in data communications?


-providing the rules required for a specific type of communication to occur

Which two statements are true of the deterministic access method?(Choose two.)
-The throughput is predictable
-Devices take turns transmitting

In fiber optic meda, the signals are represented as patterns of -light

What type of delivery uses data link layer addresses?


-local delivery

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which two factors influence the method that is used for media access control? (Choose two.)
-how connection between nodes appears to the data link layer
-how nodes share the media

Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up. -Only

some aspects of the router configuration can be viewed

Data Comms and Networking Midterm Exam 48/50


Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC? -IEEE

802.2

Which number or set of numbers represents a socket?


Answer: 192.168.1.1:80

A user is unable to access the company server from a computer. On issuing the ipconfig command, the
user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
-experimental

What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3? Answer:

64 bytes – 1518 bytes

Which statement is true about an interface that is configured with the IPv6 address command?
-A link-local IPv6 address is automatically

Which address is a multicast MAC address?


Answer: 01-00-5E-00-00-C8

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which application use UDP as the transport layer protocol?


-SMTP

What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer?
(Choose three.)
-Frame delimiting
-Error detection
-Addressing

The last host address on the 10.15.25.0/24 network is


Answer: 10.15.25.254

Which statement accurately describes public IP addresses?


-Public IP addresses must be unique across the entire Internet

What is true about the Ethernet MAC address? (Choose three.)


-The MAC address is also known as a burned-in address.
-The first 6 hexadecimal digits of a MAC address represent the OUI.
-The vendor is responsible for assigning the last 24 bits of the MAC address.

A network administrator notices that the default gateway devices sends an ICMP Redirect message to
the workstation when the workstation tries to connect to file server on another network. What is the
purpose for this ICMP message?
-To notify the workstation, that another router on the same network, is the better default-gateway to
reach the remote server

Which field in an Ethernet frame is used for error detection?


-Frame Check Sequence

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What happens when a data collision occurs on an Ethernet bus?


-All devices stop transmitting and try again later.

Which address is used as a destination address on a broadcast Ethernet frame? Answer:

FF-FF-FF-FF-FF-FF

What is the purpose of using a source port number in a TCP communication? -to

keep track of multiple conversations between devices

At which layers of the OSI model does Ethernet function? (Choose two.)
-Physical
-Data link

The shortest compressed format of the IPv6 address 2001 :0DB8:0000:1470:0000:0000:0000:0200 is

Answer: 2001:DB8:0:1470::200

The 8-bit binary value for 41 is


Answer: 00101001

What is the name given to the Ethernet MAC sublayer PDU?


-Frame

Data Comms Midterm Quiz 1 23/26

EtherType value for frame that indicates an ARP frame.


Answer: 0x0806

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

When transporting data from real-time applications, such as streaming audio and video, which field in
the IPv6 header can be used to inform the routers and switches to maintain the same path for the
packets in the same conversation?
-Flow Label

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

-gateway of last resort

Which action is performed by a client when establishing communication with a server via the use of
UDP at the transport layer?
-The client randomly selects a source port number

What is the command netstat –r used for?


-to display the host routing table

Which three fields are used in a UDP segment header? (Choose three.)
-Source Port
-Checksum
-Length

During troubleshooting procedures, from which location will most Cisco routers load a limited IOS

-ROM

What happens if part of an FTP message is not delivered to the destination? -The

part of the FTP message that was lost is re-sent

EtherType value for frame that contains IPv4 datagram.

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Answer: 0x0800

How does one compute for the protocol overhead for Ethernet as a percentage? (Packet

size - Payload size) / Packet size

In a ARP request frame what is the value of the destination mac address field? Answer:

FFFF.FFFF.FFFF

Which two files are loaded into RAM by the router when it boots? (Choose two.)
-startup configuration
-IOS image

How does one calculate the protocol efficiency for Ethernet?


-Payload size / Packet size

How does the network layer use the MTU value?


-The MTU is passed to the network layer by the data link layer

When a client connects to an HTTP server by the use of a randomly generated source port number,
what destination port number will the HTTP server use when building a response?
-the original source port number that was randomly generated by the client

A collision fragment, also known as __________ frame, is a frame of fewer than 64 bytes in length.

-runt

Which entities are involve in a temporary communication that is established by the transport layer?

-applications

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What could be calculated from the formula "Efficiency x Net bit rate"?
-Throughput

What is an advantage of UDP over TCP?


-UDP communication requires less overhead

What are two functions that are provided by the network layer? (Choose two.)
-directing data packets to destination hosts on other networks
-providing end devices with a unique network identifier

What could be calculated from the formula "Time spent transmitting data / Total Time"? -Channel

utilization

Which term defines the processing capabilities of a switch by rating how much data can be processed
per second?
-forwarding rate

It is the rate of how much data can be processed per second by a switch. -forwarding

rate

Within a production network, what is the purpose of configuring a switch with a default gateway
address?
-The default gateway address is used to forward packets originating from the switch to remote
networks.

An EtherType value of 0x8100 indicates a presence of what?


Answer: IEEE 802.1Q tag

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

During the boot process, in what memory location will the router bootstrap program look for the IOS
image if a TFTP server is not used?
-flash

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a
packet?
-Time-to-Live

What is a group of web pages that groups of individuals can edit and view together called?

-Wiki

What are the primary requirements of information security? (Choose three.)


-Confidentiality
-Availability
-Integrity

What is a network infrastructure that provides access to other networks over a wide geographic area?

-WAN

What is the primary defense against unauthorized remote access to network devices? -

Configuring a VTY password

Which of the following are business-class Internet connection technologies normally supplied by a
service provider? (Choose two.)
-Leased lines
-Metro Ethernet

In which scenario would the use of a WISP be recommended?


-a farm in a rural area without wired broadband access

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which statement describes a network that supports QoS?


-The network provides predictable levels of service to different types of traffic

Why would a network administrator use the CLI of the Cisco IOS?
-to add a password to a Cisco network device

What type of connection to a Cisco IOS switch is used to make the initial configuration?

-Console port

What type of information would be found on a logical topology diagram? -IP

addressing scheme

Why would a technician enter the command copy startup-config running config? -to

copy an existing configuration into RAM

What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
-Command

A data center has recently updated a physical server to host multiple operating systems on a single
CPU. The data center can now provide each customer with a separate web server without having to
allocate an actual discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
-virtualization

An administrator has just changed the IP address of an interface on an IOS device. What else must be
done in order to apply those changes to the device?
-Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which statement describes a feature of an IOS host name configuration? -It

does not allow spaces

What is the Cisco IOS?


-The operating system for the Cisco network device

A network administer has forgotten the argument of an IOS command. How would the administrator
get help from the IOS CLI to complete the command correctly?
-Type the command and then press the? key

Which devices would be considered end devices on a network? (Choose four.) -Printer

-Tablet computer
-IP phone
-Server

What is a fault-tolerant network?


- A network that can reroute traffic in case of device failure

To save time, IOS commands may be partially entered and then completed by typing which key or key
combination?
-Tab

A technician configures a switch with these commands:

SwitchA(config)# interface vlan 1


SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What is the technician configuring?


-SVI

What is a converged network?


-A network where voice, video, and data move over the same infrastructure

An ____________is a private connection of LANs and WANs that belongs to an organization, and is
designed to be accessible only by the members and employees of the organization, or others with
authorization.
-Intranet

Which type of traffic must receive the highest priority from QoS?
-VOIP

What command will display a list of keywords available for viewing the status of an IOS Switch

Switch# show?

A _______ network is able to expand to accept new devices and applications without affecting
performance.
-scalable

When the command "Switch(config)# hostname EaSt-2+56" is entered in a Cisco IOS device using the
CLI, what will be returned in the CLI?
EaSt-2+56(config)#

The farther you are from the central office when utilizing a DSL connection, the_______ the connection
speed.
-slower

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

How is the Cisco IOS generally accessed and navigated?


Through the CLI using a terminal emulator

Which device acts as gateway to allow hosts to send traffic to remote IP networks? -local

router

What are two benefits of collaboration and video-on-demand applications? (Choose two.)
-providing a richer e-learning environment
-providing better social media opportunities

Which technology would be best to provide a home user with a highspeed, always-on Internet
connection?
-DSL

During a routine inspection, a technician discovered that software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat
is affecting this computer?
-spyware

What is a wiki?
-web page that groups of people can edit and review

Which type of network design combines voice, video, and data on the same communication channel?

-a converged network

Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up. -Only

some aspects of the router configuration can be viewed

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which message timing factor impacts how much information can be sent and the speed at which it can
be delivered?
-Flow control

Which of the following elements do both human and computer communication systems have in
common? (Choose three.)
- Source
-Default gateway (wrong) channel siguro
-Receiver

Which of the following OSI model layers have the same functionality as the network access layer in the
TCP/IP model? (Choose two.)
-Data link
-physical

What happens when two devices on the same subnet are communicating? -The

host portion of the IP addresses will be different

Which statement is correct about network protocols?


-They define how messages are exchanged between the sources and the destination

Which application layer protocol allows users on one network to reliably transfer files to and from a
host on another network?
-FTP

What is and advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which OSI reference model layer is responsible for common representation of the data transferred
between application layer services?
-Physical (wrong)

Which is a function of the Logical Link Control (LLC) sublayer?


-to identify which network layer protocol is being used

What is the purpose of protocols in data communications?


-providing the rules required for a specific type of communication to occur

What is the transport layer PDU?


-Segment

What is the name given to a one-to-many message delivery option?


-Multicast

Which of the following are examples of proprietary protocols? (Choose two.)


-Novell NetWare
-AppleTalk

Which two factors influence the method that is used for media access control? (Choose two.)
-how nodes share the media
-how connection between nodes appears to the data link layer

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

-IEEE

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What name is given to a group of interrelated protocols necessary to perform a communication


function?
-Protocol suite

What happens to frames that are too long or too short for the channel used?
-They are dropped.

What organization is responsible for the overall management and development of Internet standards?

-IAB

Which two components are added to the PDU at the network access layer? (Choose two.)
-Trailer
-frame header

Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout

Which organization is responsible for the standard that defines Media Access Control for wired
Ethernet?
-IEEE

Which TCP/IP model layer is responsible for providing the best path through the network?

-Internet

What is an advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What will a network administrator use to modify a configuration on a Cisco router? -IOS

What three functions are defined by network protocols to allow communication between known
source and destination IP addresses? (Choose three.)
-data encoding
-message size
-delivery options

What type of protocol describes communication over a data link and the physical transmission of data
on the network media?
-Network access protocol

Which organization is responsible for developing communications standards for Voice over IP (VoIP)
devices?
-The Telecommunications Industry Association (TIA)

Which logical address is used for delivery of data to a remote network? -destination

ip address

What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
-(config) # service password-encryption

Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast

A ___________ address is defined as a reserved address that routes packets back to the host

-loopback

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which two statements are true of the deterministic access method?(Choose two.)
-Devices take turns transmitting
-The throughput is predictable

Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model?
(Choose two.)
-TCP
-UDP

In fiber optic meda, the signals are represented as patterns of -light

For which three reasons was a packet switched connectionless data communications technology used
when developing the Internet (Choose three.)
-Data packets can travel through the network using multiple different paths
-it can rapidly adapt to the failure of network devices and communication links
-Network devices dynamically decide on the best available path to forward each packet.

Where is the configuration used during startup on Cisco IOS devices located? -Startup

config

Which of the following are disadvantages of peer-to-peer networking? (Choose two.)

-Scalability

-No centralized administration

What is encrypted with the enable secret command?


-the privileged executive mode password

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the
CLI, what will be returned in the CLI?
-EaSt-2+56(config)#

What command will display a list of keywords available for viewing the status of an IOS switch?
-Switch# show?

When is a wired connection preffered to a wireless connection by an end-user device?


-when the end-user device will run an application that requires a dedicated connection to the network

An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given
period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
-goodput

Which command or key combination allows a user to return to the previous level in the command
hierarchy?
-exit

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of
the TCP/IP model?
-segment

Which area of the network would a college IT staff most likely have to redesign as a direct result of
many students bringing their own tablets and smartphones to school to access school resources?
-wireless LAN

What is a characteristic of a contention-based access method?


-It is as nondeterministic method

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

A web client is sending a request for a webpage to a web server. From the perspective of the client,
what is the correct order of the protocol stack that is used to prepare the request for transmission?
-HTTP, TCP, IP, Ethernet

What are two functions of end devices on a network? (Choose two.)


-They originate the data that flows through the network.
-They are the interface between humans and the communication network.

What type of delivery uses data link layer addresses?


-local delivery

Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.)
-cellular
-satellite
What method can be used by two computers to ensure that packets are not dropped because too
much data is being sent too quickly?
-flow control

What type of address is 01-00-5E-0A-00-02?


-an address that reaches a specific group of hosts

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a
secure environment?
-Use the console port to locally access the switch from a serial or USB interface of the PC.

Which device performs the function of determining the path that messages should take through
internet works?
-a router

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three
characteristics of a peer-to-peer network? (Choose three.)
-easy to create
-lacks centralized administration
-less cost to implement

What two criteria are used to help select a network medium from various network media? (Choose
two.)
-the distance the selected medium can successfully carry a signal
-the environment where the selected medium is to be installed

Which two connection options provide an always-on, high-bandwidth Internet connection to


computers in a home office? (Choose two.)
-DSL
-cable
An employee at a branch office is creating a quote for a customer. In order to do this, the employee
needs to access confidential pricing information from internal servers at the Head Office. What type of
network would the employee access?
-an intranet

What process is used to place one message inside another message for transfer from the source to the
destination?
-encapsulation

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file
contains an enable secret password but no console password. When the router boots up, which mode
will display?
-user EXEC mode

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to
the interface?
-no switchport

The Ethernet __________ sublayer is responsible for communicating directly with the physical layer.

-MAC

A network administrator needs to keep the user ID, password, and session contents private when
establishing remote CLI connectivity with a switch to manage it. Which access method should be
chosen?
-SSH

Which statement describes a characteristic of the frame header fields of the data link layer?

-They vary depending on protocols

What is the function of the kernel of an operating software?


-The kernel provisions hardware resources to meet software requirements.
What is a characteristic of a WAN hub-and-spoke topology?
-The branch sites are connected to a central site through point-point links

Which two statements describe intermediary devices? (Choose two.)


-Intermediary devices connect individual hosts to the network.
-Intermediary devices direct the path of the data.

What is the purpose of the physical link control field in a data link layer header? -to

establish the media link

Which two engineering organizations define open standards and protocols that apply to the data link
layer?

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-International Telecommunication Union (ITU)


-International Organization for Standardization (ISO)

What type of communication will send a message to all devices on a local area network?

-broadcast

Which term describes the state of a network when the demand on the network resources exceeds the
available capacity?
-congestion

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks
the user to ping the IP address of the default gateway that is configured on the workstation. What is the
purpose for this command?
-to test if the workstation can communicate on the network

On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the _________ MAC
address
-broadcast

Which two statement describe broadcast transmissions on a wired network? (Choose two.)
-Limited broadcasts are only intended for the hosts on a local network
-Directed broadcasts are intended for all hosts on a local or remote network

Which destination address is used in an ARP request frame?


Answer: FFFF.FFFF.FFFF

Which two functions or operations are performed by the MAC sublayer? (Choose two.)
-it adds a header and trailer to form an OSI Layer 2 PDU
-It is responsible for Media Access Control

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With
this prefix, how many bits are available for your organization to create subnetworks? Answer: 16

Which type of IPv6 address is not routable and used for communication on a single subnet? -link-

local address

What are the parts of an IPv4 address? (Choose two.)


-Network
-Host
Data Comms and Networking 1 Final Quiz 1
Which two components are added to the PDU at the network access layer? (Choose two.) -Trailer

-frame header

What three functions are defined by network protocols to allow communication between known
source and destination IP addresses? (Choose three.)
-delivery options
-message size
-data encoding

Which statement is correct about network protocols?


-They define how messages are exchanged between the sources and the destination

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

Answer: IEEE

Which logical address is used for delivery of data to a remote network? Answer:

destination IP address

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What will a network administrator use to modify a configuration on a Cisco router? -IOS

What is an advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout

What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
-(config) # service password-encryption

What happens when two devices on the same subnet are communicating?
-The host portion of the IP addresses will be different

Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast

Which is a function of the Logical Link Control (LLC) sublayer?


-to identify which network layer protocol is being used

A ______ address is defined as a reserved address that routes packets back to the host

-loopback

What are the parts of an IPv4 address? (Choose two.)

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-Host
-Network

What is the purpose of protocols in data communications?


-providing the rules required for a specific type of communication to occur

Which two statements are true of the deterministic access method?(Choose two.)
-The throughput is predictable
-Devices take turns transmitting

In fiber optic meda, the signals are represented as patterns of


-light

What type of delivery uses data link layer addresses?


-local delivery

Which two factors influence the method that is used for media access control? (Choose two.)
-how connection between nodes appears to the data link layer
-how nodes share the media

Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up. -Only

some aspects of the router configuration can be viewed

Which TCP header field specifies the number of bytes that can be accepted before an
acknowledgement is required?
-Window size (not sure)

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What are the primary purposes of the transport layer? (Choose three.)
-Tracking the individual communication between applications on the source and destination hosts
-Segmenting data for and reassembling segmented data into streams of application data at the
destination
-Identifying the proper application for each communication stream

What is an advantage that UDP has over TCP?


-Low overhead

A client is downloading a large file from a server using FTP. Many of the segments are lost during
transit. What will most likely happen?
-The FTP client responds to the server with a smaller window size in the TCP header.

What does UDP do when receiving messages that are more than one datagram in length?
-UDP reassembles that data in the order it was received and passes it to the application

What range of ports can either be used by TCP or UDP to identify the requested service on the
destination device or as a client source port?
Answer: 49152 to 65535

What is a characteristic of UDP?


-Connectionless

What three protocols do email users and servers use to process email? (Choose three.)
-IMAP4
-SMTP
-POP3

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

The TCP/IP application layer effectively consists of which three OSI layers? -Application,

presentation, session

What is assigned by the transport layer to identify an application or service? -Port

Data Comms Midterm Quiz 1 23/26

EtherType value for frame that indicates an ARP frame.


Answer: 0x0806

When transporting data from real-time applications, such as streaming audio and video, which field in
the IPv6 header can be used to inform the routers and switches to maintain the same path for the
packets in the same conversation?
-Flow Label

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

-gateway of last resort

Which action is performed by a client when establishing communication with a server via the use of
UDP at the transport layer?
-The client randomly selects a source port number

What is the command netstat –r used for?


-to display the host routing table

Which three fields are used in a UDP segment header? (Choose three.)
-Source Port
-Checksum

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-Length

During troubleshooting procedures, from which location will most Cisco routers load a limited IOS

-ROM

What happens if part of an FTP message is not delivered to the destination? -The

part of the FTP message that was lost is re-sent

EtherType value for frame that contains IPv4 datagram.


Answer: 0x0800

How does one compute for the protocol overhead for Ethernet as a percentage? (Packet

size - Payload size) / Packet size

In a ARP request frame what is the value of the destination mac address field? Answer:

FFFF.FFFF.FFFF

Which two files are loaded into RAM by the router when it boots? (Choose two.)
-startup configuration
-IOS image

How does one calculate the protocol efficiency for Ethernet?


-Payload size / Packet size

How does the network layer use the MTU value?


-The MTU is passed to the network layer by the data link layer

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

When a client connects to an HTTP server by the use of a randomly generated source port number,
what destination port number will the HTTP server use when building a response?
-the original source port number that was randomly generated by the client

A collision fragment, also known as __________ frame, is a frame of fewer than 64 bytes in length.

-runt

Which entities are involve in a temporary communication that is established by the transport layer?

-applications

What could be calculated from the formula "Efficiency x Net bit rate"?
-Throughput

What is an advantage of UDP over TCP?


-UDP communication requires less overhead

What are two functions that are provided by the network layer? (Choose two.)
-directing data packets to destination hosts on other networks
-providing end devices with a unique network identifier

What could be calculated from the formula "Time spent transmitting data / Total Time"? -Channel

utilization

It is the rate of how much data can be processed per second by a switch. -forwarding

rate

Within a production network, what is the purpose of configuring a switch with a default gateway
address?

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-The default gateway address is used to forward packets originating from the switch to remote
networks.

An EtherType value of 0x8100 indicates a presence of what?


Answer: IEEE 802.1Q tag

During the boot process, in what memory location will the router bootstrap program look for the IOS
image if a TFTP server is not used?
-flash

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a
packet?
-Time-to-Live

Data Comms Midterm Quiz 2 (19/20)


Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC? -IEEE

802.2

Which number or set of numbers represents a socket?


Answer: 192.168.1.1:80

A user is unable to access the company server from a computer. On issuing the ipconfig command, the
user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
-experimental

What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3? Answer:

64 bytes – 1518 bytes

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which statement is true about an interface that is configured with the IPv6 address command?

-A link-local IPv6 address is automatically

Which address is a multicast MAC address?


Answer: 01-00-5E-00-00-C8

Which application use UDP as the transport layer protocol?


-SMTP

What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer?
(Choose three.)
-Frame delimiting
-Error detection
-Addressing

The last host address on the 10.15.25.0/24 network is


Answer: 10.15.25.254

Which statement accurately describes public IP addresses?


-Public IP addresses must be unique across the entire Internet

What is true about the Ethernet MAC address? (Choose three.)


-The MAC address is also known as a burned-in address.
-The first 6 hexadecimal digits of a MAC address represent the OUI.
-The vendor is responsible for assigning the last 24 bits of the MAC address.

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

A network administrator notices that the default gateway devices sends an ICMP Redirect message to
the workstation when the workstation tries to connect to file server on another network. What is the
purpose for this ICMP message?
-To notify the workstation, that another router on the same network, is the better default-gateway to
reach the remote server

Which field in an Ethernet frame is used for error detection?


-Frame Check Sequence

What happens when a data collision occurs on an Ethernet bus?


-All devices stop transmitting and try again later.

Which address is used as a destination address on a broadcast Ethernet frame? Answer:

FF-FF-FF-FF-FF-FF

What is the purpose of using a source port number in a TCP communication? -to

keep track of multiple conversations between devices

At which layers of the OSI model does Ethernet function? (Choose two.)
-Physical
-Data link

The shortest compressed format of the IPv6 address 2001 :0DB8:0000:1470:0000:0000:0000:0200 is

Answer: 2001:DB8:0:1470::200

The 8-bit binary value for 41 is


Answer: 00101001

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What is the name given to the Ethernet MAC sublayer PDU?


-Frame

What is a group of web pages that groups of individuals can edit and view together called?

-Wiki

What are the primary requirements of information security? (Choose three.)


-Confidentiality
-Availability
-Integrity

What is a network infrastructure that provides access to other networks over a wide geographic area?

-WAN

What is the primary defense against unauthorized remote access to network devices? -

Configuring a VTY password

Which of the following are business-class Internet connection technologies normally supplied by a
service provider? (Choose two.)
-Leased lines
-Metro Ethernet

In which scenario would the use of a WISP be recommended?


-a farm in a rural area without wired broadband access

Which statement describes a network that supports QoS?


-The network provides predictable levels of service to different types of traffic

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Why would a network administrator use the CLI of the Cisco IOS?
-to add a password to a Cisco network device

What type of connection to a Cisco IOS switch is used to make the initial configuration?

-Console port

What type of information would be found on a logical topology diagram? -IP

addressing scheme

Why would a technician enter the command copy startup-config running config? -to

copy an existing configuration into RAM

What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
-Command

A data center has recently updated a physical server to host multiple operating systems on a single
CPU. The data center can now provide each customer with a separate web server without having to
allocate an actual discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
-virtualization

An administrator has just changed the IP address of an interface on an IOS device. What else must be
done in order to apply those changes to the device?
-Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.

Which statement describes a feature of an IOS host name configuration? -It

does not allow spaces

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What is the Cisco IOS?


-The operating system for the Cisco network device

A network administer has forgotten the argument of an IOS command. How would the administrator
get help from the IOS CLI to complete the command correctly?
-Type the command and then press the? key

Which devices would be considered end devices on a network? (Choose four.) -Printer

-Tablet computer
-IP phone
-Server

What is a fault-tolerant network?


- A network that can reroute traffic in case of device failure

To save time, IOS commands may be partially entered and then completed by typing which key or key
combination?
-Tab

A technician configures a switch with these commands:

SwitchA(config)# interface vlan 1


SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
-SVI

What is a converged network?

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-A network where voice, video, and data move over the same infrastructure

An ____________is a private connection of LANs and WANs that belongs to an organization, and is
designed to be accessible only by the members and employees of the organization, or others with
authorization.
-Intranet

Which type of traffic must receive the highest priority from QoS?
-VOIP

What command will display a list of keywords available for viewing the status of an IOS Switch

Switch# show?

A _______ network is able to expand to accept new devices and applications without affecting
performance.
-scalable

When the command "Switch(config)# hostname EaSt-2+56" is entered in a Cisco IOS device using the
CLI, what will be returned in the CLI?
EaSt-2+56(config)#

The farther you are from the central office when utilizing a DSL connection, the_______ the connection
speed.
-slower

How is the Cisco IOS generally accessed and navigated?


Through the CLI using a terminal emulator

Which device acts as gateway to allow hosts to send traffic to remote IP networks?

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-local router

What are two benefits of collaboration and video-on-demand applications? (Choose two.)
-providing a richer e-learning environment
-providing better social media opportunities

Which technology would be best to provide a home user with a highspeed, always-on Internet
connection?
-DSL

During a routine inspection, a technician discovered that software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat
is affecting this computer?
-spyware

What is a wiki?
-web page that groups of people can edit and review

Which type of network design combines voice, video, and data on the same communication channel?

-a converged network

Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up. -Only

some aspects of the router configuration can be viewed

Which message timing factor impacts how much information can be sent and the speed at which it can
be delivered?
-Flow control

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which of the following elements do both human and computer communication systems have in
common? (Choose three.)
- Source
-Default gateway (wrong) channel siguro
-Receiver

Which of the following OSI model layers have the same functionality as the network access layer in the
TCP/IP model? (Choose two.)
-Data link
-physical

What happens when two devices on the same subnet are communicating? -The

host portion of the IP addresses will be different

Which statement is correct about network protocols?


-They define how messages are exchanged between the sources and the destination

Which application layer protocol allows users on one network to reliably transfer files to and from a
host on another network?
-FTP

What is and advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

Which OSI reference model layer is responsible for common representation of the data transferred
between application layer services?
-Physical (wrong)

Which is a function of the Logical Link Control (LLC) sublayer?

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-to identify which network layer protocol is being used

What is the purpose of protocols in data communications?


-providing the rules required for a specific type of communication to occur

What is the transport layer PDU?


-Segment

What is the name given to a one-to-many message delivery option?


-Multicast

Which of the following are examples of proprietary protocols? (Choose two.)


-Novell NetWare
-AppleTalk

Which two factors influence the method that is used for media access control? (Choose two.)
-how nodes share the media
-how connection between nodes appears to the data link layer

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

-IEEE

What name is given to a group of interrelated protocols necessary to perform a communication


function?
-Protocol suite

What happens to frames that are too long or too short for the channel used?
-They are dropped.

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What organization is responsible for the overall management and development of Internet standards?

-IAB

Which two components are added to the PDU at the network access layer? (Choose two.) -Trailer

-frame header

Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout

Which organization is responsible for the standard that defines Media Access Control for wired
Ethernet?
-IEEE

Which TCP/IP model layer is responsible for providing the best path through the network?

-Internet

What is an advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

What will a network administrator use to modify a configuration on a Cisco router? -IOS

What three functions are defined by network protocols to allow communication between known
source and destination IP addresses? (Choose three.)
-data encoding
-message size
-delivery options

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What type of protocol describes communication over a data link and the physical transmission of data
on the network media?
-Network access protocol

Which organization is responsible for developing communications standards for Voice over IP (VoIP)
devices?
-The Telecommunications Industry Association (TIA)

Which logical address is used for delivery of data to a remote network? -destination

ip address

What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
-(config) # service password-encryption

Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast

A ___________ address is defined as a reserved address that routes packets back to the host
-loop back (wrong)
-try loop-back

Which two statements are true of the deterministic access method?(Choose two.)
-Devices take turns transmitting
-The throughput is predictable

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model?
(Choose two.)
-TCP
-UDP

In fiber optic meda, the signals are represented as patterns of


-light

For which three reasons was a packet switched connectionless data communications technology used
when developing the Internet (Choose three.)
-Data packets can travel through the network using multiple different paths
-it can rapidly adapt to the failure of network devices and communication links
-Network devices dynamically decide on the best available path to forward each packet.

Where is the configuration used during startup on Cisco IOS devices located? -Startup

config

Which of the following are disadvantages of peer-to-peer networking? (Choose two.)

-Scalability

-No centralized administration

What is encrypted with the enable secret command?


-the privileged executive mode password

When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the
CLI, what will be returned in the CLI?
-EaSt-2+56(config)#

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What command will display a list of keywords available for viewing the status of an IOS switch?
-Switch# show?

When is a wired connection preffered to a wireless connection by an end-user device?


-when the end-user device will run an application that requires a dedicated connection to the network

An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given
period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
-goodput

Which command or key combination allows a user to return to the previous level in the command
hierarchy?
-exit

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of
the TCP/IP model?
-segment

Which area of the network would a college IT staff most likely have to redesign as a direct result of
many students bringing their own tablets and smartphones to school to access school resources?
-wireless LAN

What is a characteristic of a contention-based access method?


-It is as nondeterministic method

A web client is sending a request for a webpage to a web server. From the perspective of the client,
what is the correct order of the protocol stack that is used to prepare the request for transmission?
-HTTP, TCP, IP, Ethernet

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What are two functions of end devices on a network? (Choose two.)


-They originate the data that flows through the network.
-They are the interface between humans and the communication network.

What type of delivery uses data link layer addresses?


-local delivery

Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.)
-cellular
-satellite

What method can be used by two computers to ensure that packets are not dropped because too
much data is being sent too quickly?
-flow control

What type of address is 01-00-5E-0A-00-02?


-an address that reaches a specific group of hosts

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a
secure environment?
-Use the console port to locally access the switch from a serial or USB interface of the PC.

Which device performs the function of determining the path that messages should take through
internet works?
-a router

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three
characteristics of a peer-to-peer network? (Choose three.)

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-easy to create
-lacks centralized administration
-less cost to implement

What two criteria are used to help select a network medium from various network media? (Choose
two.)
-the distance the selected medium can successfully carry a signal
-the environment where the selected medium is to be installed

Which two connection options provide an always-on, high-bandwidth Internet connection to


computers in a home office? (Choose two.)
-DSL
-cable

An employee at a branch office is creating a quote for a customer. In order to do this, the employee
needs to access confidential pricing information from internal servers at the Head Office. What type of
network would the employee access?
-an intranet

What process is used to place one message inside another message for transfer from the source to the
destination?
-encapsulation

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file
contains an enable secret password but no console password. When the router boots up, which mode
will display?
-user EXEC mode

Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to
the interface?

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-no switchport

The Ethernet __________ sublayer is responsible for communicating directly with the physical layer.

-MAC

A network administrator needs to keep the user ID, password, and session contents private when
establishing remote CLI connectivity with a switch to manage it. Which access method should be
chosen?
-SSH

Which statement describes a characteristic of the frame header fields of the data link layer?

-They vary depending on protocols

What is the function of the kernel of an operating software?


-The kernel provisions hardware resources to meet software requirements.

What is a characteristic of a WAN hub-and-spoke topology?


-The branch sites are connected to a central site through point-point links

Which two statements describe intermediary devices? (Choose two.)


-Intermediary devices connect individual hosts to the network.
-Intermediary devices direct the path of the data.

What is the purpose of the physical link control field in a data link layer header? -to

establish the media link

Which two engineering organizations define open standards and protocols that apply to the data link
layer?
-International Telecommunication Union (ITU)

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-International Organization for Standardization (ISO)

What type of communication will send a message to all devices on a local area network?

-broadcast

Which term describes the state of a network when the demand on the network resources exceeds the
available capacity?
-congestion

Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up. -Only

some aspects of the router configuration can be viewed

Which message timing factor impacts how much information can be sent and the speed at which it can
be delivered?
-Flow control

Which of the following elements do both human and computer communication systems have in
common? (Choose three.)
- Source
-Default gateway (wrong) channel siguro
-Receiver

Which of the following OSI model layers have the same functionality as the network access layer in the
TCP/IP model? (Choose two.)
-Data link
-physical

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What happens when two devices on the same subnet are communicating? -The

host portion of the IP addresses will be different

Which statement is correct about network protocols?


-They define how messages are exchanged between the sources and the destination

Which application layer protocol allows users on one network to reliably transfer files to and from a
host on another network?
-FTP

What is and advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

Which OSI reference model layer is responsible for common representation of the data transferred
between application layer services?
-Physical (wrong)

Which is a function of the Logical Link Control (LLC) sublayer?


-to identify which network layer protocol is being used

What is the purpose of protocols in data communications?


-providing the rules required for a specific type of communication to occur

What is the transport layer PDU?


-Segment

What is the name given to a one-to-many message delivery option?


-Multicast

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which of the following are examples of proprietary protocols? (Choose two.)


-Novell NetWare
-AppleTalk

Which two factors influence the method that is used for media access control? (Choose two.)
-how nodes share the media
-how connection between nodes appears to the data link layer

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

-IEEE

What name is given to a group of interrelated protocols necessary to perform a communication


function?
-Protocol suite

What happens to frames that are too long or too short for the channel used?
-They are dropped.

What organization is responsible for the overall management and development of Internet standards?

-IAB

Which two components are added to the PDU at the network access layer? (Choose two.) -Trailer

-frame header

Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which organization is responsible for the standard that defines Media Access Control for wired
Ethernet?
-IEEE

Which TCP/IP model layer is responsible for providing the best path through the network?

-Internet

What is an advantage of using standards to develop and implement protocols? -Products

from different manufacturers can interoperate successfully

What will a network administrator use to modify a configuration on a Cisco router? -IOS

What three functions are defined by network protocols to allow communication between known
source and destination IP addresses? (Choose three.)
-data encoding
-message size
-delivery options

What type of protocol describes communication over a data link and the physical transmission of data
on the network media?
-Network access protocol

Which organization is responsible for developing communications standards for Voice over IP (VoIP)
devices?
-The Telecommunications Industry Association (TIA)

Which logical address is used for delivery of data to a remote network? -destination

ip address

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
-(config) # service password-encryption

Which message delivery option is used when all devices need to receive the same message
simultaneously?
broadcast

A ___________ address is defined as a reserved address that routes packets back to the host
-loop back (wrong)
-try loop-back

Which two statements are true of the deterministic access method?(Choose two.)
-Devices take turns transmitting
-The throughput is predictable

Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model?
(Choose two.)
-TCP
-UDP

In fiber optic meda, the signals are represented as patterns of -light

What is a group of web pages that groups of individuals can edit and view together called?

-Wiki

What are the primary requirements of information security? (Choose three.)


-Confidentiality

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-Availability
-Integrity

What is a network infrastructure that provides access to other networks over a wide geographic area?

-WAN

What is the primary defense against unauthorized remote access to network devices? -

Configuring a VTY password

Which of the following are business-class Internet connection technologies normally supplied by a
service provider? (Choose two.)
-Leased lines
-Metro Ethernet

In which scenario would the use of a WISP be recommended?


-a farm in a rural area without wired broadband access

Which statement describes a network that supports QoS?


-The network provides predictable levels of service to different types of traffic

Why would a network administrator use the CLI of the Cisco IOS?
-to add a password to a Cisco network device

What type of connection to a Cisco IOS switch is used to make the initial configuration?

-Console port

What type of information would be found on a logical topology diagram? -IP

addressing scheme

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Why would a technician enter the command copy startup-config running config? -to

copy an existing configuration into RAM

What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
-Command

A data center has recently updated a physical server to host multiple operating systems on a single
CPU. The data center can now provide each customer with a separate web server without having to
allocate an actual discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
-virtualization

An administrator has just changed the IP address of an interface on an IOS device. What else must be
done in order to apply those changes to the device?
-Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.

Which statement describes a feature of an IOS host name configuration? -It

does not allow spaces

What is the Cisco IOS?


-The operating system for the Cisco network device

A network administer has forgotten the argument of an IOS command. How would the administrator
get help from the IOS CLI to complete the command correctly?
-Type the command and then press the? key

Which devices would be considered end devices on a network? (Choose four.) -Printer

-Tablet computer

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

-IP phone
-Server

What is a fault-tolerant network?


- A network that can reroute traffic in case of device failure

What is a converged network?


-A network where voice, video, and data move over the same infrastructure

Which type of traffic must receive the highest priority from QoS?
-VOIP

What command will display a list of keywords available for viewing the status of an IOS Switch

Switch# show?

When the command "Switch(config)# hostname EaSt-2+56" is entered in a Cisco IOS device using the
CLI, what will be returned in the CLI?
EaSt-2+56(config)#
How is the Cisco IOS generally accessed and navigated?
-Through the CLI using a terminal emulator

Which device acts as gateway to allow hosts to send traffic to remote IP networks?

-local router

What are two benefits of collaboration and video-on-demand applications? (Choose two.)

-providing a richer e-learning environment

-providing better social media opportunities

Help for Education (source4educ.blogspot.com)


https://source4educ.blogspot.com/p/ugrd-it6201-data-communications-and.html

Which technology would be best to provide a home user with a highspeed, always-on Internet
connection?
-DSL

During a routine inspection, a technician discovered that software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat
is affecting this computer?
-spyware

Help for Education (source4educ.blogspot.com)

You might also like